SlideShare una empresa de Scribd logo
1 de 30
Developing Patch
Management
Best Practices
An In-Depth Technical Webcast
Today’s Agenda




             Introduction



             Curing Your Patch Management Headache
             with Lessons Learned from the Field
             • Laying the Groundwork
             • Before Patch Tuesday
             • On Patch Tuesday
             • After Patch Tuesday


             Q&A
Today’s Panelists




    Russ Ernst              Jim Czyzewski
    Group Product Manager   Supervisor – Clinical Desktop Support
    Lumension               MidMichigan Medical Center




3
Why Is Patch Management Important
                                      Sources of Endpoint Risk

                                                 5%
                                              Zero-Days

                                                30%
                                          Missing Patches

                                                65%
                                          Misconfigurations

    Today’s Endpoint Security Stack

                 AV
                Device
                Control
              Application
               Control
        Patch & Configuration
            Management

4
Benefits of a Solid Patching Process
Malware Costs Money    Patching Reduces Target Size




5
Patch Management Best Practices

                    Laying the
                   Groundwork




                     Patch
     After Patch                 Before Patch
                   Management
      Tuesday                      Tuesday
                    Process




                    On Patch
                    Tuesday


6
Laying the Groundwork
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Discover Assets




8
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Agent Maintenance
Lumension Reporting Services (LRS)




9
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Classify Value and Risk




10
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Establish Workflow and Groups
Users                 Roles




Groups




11
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Identify Test Groups




12
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Staff Training
Learning Portals




13
Before Patch Tuesday
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Prepare Resources
• Schedule Resources
     » Allocate IT resources for Patch Tuesday while also integrating additional patch
       release schedules from third-party applications, such as Adobe, Apple (ad
       hoc), Java and so forth
     » Review the patching needs of any internally-developed applications and/or
       custom patches and consider deploying these patches as part of the monthly
       patch cycle


• Reserve Down-Time for Servers
     » Reserve time slots to be able to deploy patch updates to any mission-critical
       servers within 72 hours of the Patch Tuesday release




15
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Watch for Pre-Announcements




16
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Confirm Reporting Up-to-Date




17
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Deploy Missing Updates and Pre-Requisites




18
On Patch Tuesday
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Study Information and Security Briefings




• Important information to consider when understanding the impact of Patch
  Tuesday on your environment includes:
     •   Bulletin Severity
     •   Whether or not the vulnerability is known/publicly disclosed at the time of release
     •   Does the vendor know of any active exploits at the time of release
     •   Value of the asset being patched


20
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Prioritize Potential Patches




21
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Test and Install Patches
• Follow Internal Change Control Planning and Approval Process
• Staged Testing
     • Deploy applicable bulletins to test groups
     • Ensure successful deployment before rollout to additional groups in the environment
     • Pay special attention to impact to custom-developed, internal applications
• Staged Deployments




22
After Patch Tuesday
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Deployment History




24
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Calculate Time to Deploy




25
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Monitor for Compliance
Mandatory Baseline




26
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Continuous Improvement
• Checks and Balances
     » Review the Effectiveness of Patch Tuesday Remediations


• Metrics Improvement
     » Modify system settings, distribution parameters and so forth to further optimize
       the system for next month’s updates
     » WAN optimization, polling frequency and minimizing the patches being
       detected can all help further optimize performance
     » Look for computers that did not receive updates at all or those that took
       unusually long to receive updates




27
Q&A
More Information
• Free Vulnerability Scanner Tool                    • Get a Quote (and more)
 » Discover all OS and application vulnerabilities    http://www.lumension.com/
   on your network                                    vulnerability-management/
   http://www.lumension.com/Resources/                patch-management-software/buy-now.aspx#6
   Security-Tools/Vulnerability-Scanner.aspx


• Lumension® Patch and Remediation
 » Online Demo Video:
   http://www.lumension.com/
   vulnerability-management/
   patch-management-software/demo.aspx
 » Free Trial (virtual or download):
   http://www.lumension.com/
   vulnerability-management/
   patch-management-software/free-trial.aspx




29
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255

1.888.725.7828
info@lumension.com
http://blog.lumension.com

Más contenido relacionado

Más de Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

Más de Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Último

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Best practices for Patch Management: An In-Depth Technical Presentation

  • 2. Today’s Agenda Introduction Curing Your Patch Management Headache with Lessons Learned from the Field • Laying the Groundwork • Before Patch Tuesday • On Patch Tuesday • After Patch Tuesday Q&A
  • 3. Today’s Panelists Russ Ernst Jim Czyzewski Group Product Manager Supervisor – Clinical Desktop Support Lumension MidMichigan Medical Center 3
  • 4. Why Is Patch Management Important Sources of Endpoint Risk 5% Zero-Days 30% Missing Patches 65% Misconfigurations Today’s Endpoint Security Stack AV Device Control Application Control Patch & Configuration Management 4
  • 5. Benefits of a Solid Patching Process Malware Costs Money Patching Reduces Target Size 5
  • 6. Patch Management Best Practices Laying the Groundwork Patch After Patch Before Patch Management Tuesday Tuesday Process On Patch Tuesday 6
  • 8. Laying the Groundwork | Week Before | Patch Tuesday | Week After Discover Assets 8
  • 9. Laying the Groundwork | Week Before | Patch Tuesday | Week After Agent Maintenance Lumension Reporting Services (LRS) 9
  • 10. Laying the Groundwork | Week Before | Patch Tuesday | Week After Classify Value and Risk 10
  • 11. Laying the Groundwork | Week Before | Patch Tuesday | Week After Establish Workflow and Groups Users Roles Groups 11
  • 12. Laying the Groundwork | Week Before | Patch Tuesday | Week After Identify Test Groups 12
  • 13. Laying the Groundwork | Week Before | Patch Tuesday | Week After Staff Training Learning Portals 13
  • 15. Laying the Groundwork | Week Before | Patch Tuesday | Week After Prepare Resources • Schedule Resources » Allocate IT resources for Patch Tuesday while also integrating additional patch release schedules from third-party applications, such as Adobe, Apple (ad hoc), Java and so forth » Review the patching needs of any internally-developed applications and/or custom patches and consider deploying these patches as part of the monthly patch cycle • Reserve Down-Time for Servers » Reserve time slots to be able to deploy patch updates to any mission-critical servers within 72 hours of the Patch Tuesday release 15
  • 16. Laying the Groundwork | Week Before | Patch Tuesday | Week After Watch for Pre-Announcements 16
  • 17. Laying the Groundwork | Week Before | Patch Tuesday | Week After Confirm Reporting Up-to-Date 17
  • 18. Laying the Groundwork | Week Before | Patch Tuesday | Week After Deploy Missing Updates and Pre-Requisites 18
  • 20. Laying the Groundwork | Week Before | Patch Tuesday | Week After Study Information and Security Briefings • Important information to consider when understanding the impact of Patch Tuesday on your environment includes: • Bulletin Severity • Whether or not the vulnerability is known/publicly disclosed at the time of release • Does the vendor know of any active exploits at the time of release • Value of the asset being patched 20
  • 21. Laying the Groundwork | Week Before | Patch Tuesday | Week After Prioritize Potential Patches 21
  • 22. Laying the Groundwork | Week Before | Patch Tuesday | Week After Test and Install Patches • Follow Internal Change Control Planning and Approval Process • Staged Testing • Deploy applicable bulletins to test groups • Ensure successful deployment before rollout to additional groups in the environment • Pay special attention to impact to custom-developed, internal applications • Staged Deployments 22
  • 24. Laying the Groundwork | Week Before | Patch Tuesday | Week After Deployment History 24
  • 25. Laying the Groundwork | Week Before | Patch Tuesday | Week After Calculate Time to Deploy 25
  • 26. Laying the Groundwork | Week Before | Patch Tuesday | Week After Monitor for Compliance Mandatory Baseline 26
  • 27. Laying the Groundwork | Week Before | Patch Tuesday | Week After Continuous Improvement • Checks and Balances » Review the Effectiveness of Patch Tuesday Remediations • Metrics Improvement » Modify system settings, distribution parameters and so forth to further optimize the system for next month’s updates » WAN optimization, polling frequency and minimizing the patches being detected can all help further optimize performance » Look for computers that did not receive updates at all or those that took unusually long to receive updates 27
  • 28. Q&A
  • 29. More Information • Free Vulnerability Scanner Tool • Get a Quote (and more) » Discover all OS and application vulnerabilities http://www.lumension.com/ on your network vulnerability-management/ http://www.lumension.com/Resources/ patch-management-software/buy-now.aspx#6 Security-Tools/Vulnerability-Scanner.aspx • Lumension® Patch and Remediation » Online Demo Video: http://www.lumension.com/ vulnerability-management/ patch-management-software/demo.aspx » Free Trial (virtual or download): http://www.lumension.com/ vulnerability-management/ patch-management-software/free-trial.aspx 29
  • 30. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com http://blog.lumension.com