This research paper will focus on issues and concerns with Patch Management. With the advent of many types of software and systems, patch management is major nightmare. Patching the system may cause the system to crash, and not patching it can leave it vulnerable to attacks. Please research the issues and concerns with patch management and provide your views on the topic. Please consider this at an enterprise level where the complexity is increased exponentially with the increase in the number of systems.Paper Requirements:APA FormatNumber of Pages: Minimum of 3 Pages not including Cover, Table of Contents and References.Safe – Assignment comparison will be done
css.pdf

Unformatted Attachment Preview

Interested in learning
more about security?
SANS Institute
InfoSec Reading Room
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.
A Practical Methodology for Implementing a Patch
management Process
The time between the discovery of an operating system or application vulnerability and the emergence of an
exploit is getting shorter, sometimes only a matter of hours. This imposes pressures on IT managers to rapidly
patch production systems which directly conflicts with configuration management best practices of quality
assurance testing. Many organizations are struggling to keep current with the constant release of new patches
and updates. At the same time, they are under pressure to provide near 100% availability o…
AD
Copyright SANS Institute
Author Retains Full Rights
Daniel Voldal
Version 1.4b
A Practical Methodology for Implementing a Patch management Process
Executive Summary
ut
ho
rr
eta
ins
fu
ll r
igh
ts
The time between the discovery of an operating system or application
vulnerability and the emergence of an exploit is getting shorter, sometimes only a
matter of hours. This imposes pressures on IT managers to rapidly patch
production systems which directly conflicts with configuration management best
Key fingerprint
= AF19
FA27 2F94
998D FDB5
F8B5 06E4
4E46 to keep
practices
of quality
assurance
testing.
ManyDE3D
organizations
areA169
struggling
current with the constant release of new patches and updates. At the same time,
they are under pressure to provide near 100% availability of key business
systems. IT organizations must develop a process to ensure the availability of
resources, install required security patches and not break existing systems in the
process. This paper presents one methodology for identifying, evaluating and
applying security patches in a real world environment along with descriptions of
some useful tools that can be used to automate the process.
,A
Understand the Risk of Patching vs. Not Patching
©
SA
NS
In
sti
tu
te
20
03
While it is essential to protect company IT assets from attack, patching
vulnerabilities is only one part of the risk equation. A responsible system
administrator must also look at the potential threat along with the vulnerability to
determine the risk of having an unpatched system.
“Patch management is a subset of the overall configuration management
process” (Colville, p.1). This means that an organization should have in place a
strategy for establishing, documenting, maintaining and changing the
configuration of all servers and workstations according to their function.
Configuration management underlies the management of all other management
functions: security, performance, accounting and fault. Fault is the management
of device failures. Establishing a patch management plan can be considered a
dress rehearsal for developing a configuration management strategy.
Developing a risk management strategy goes hand in hand with creating a patch
management plan. A risk assessment should be performed on all servers on the
network. This assessment should include the criticality of the data on the server,
the impact of server downtime on enterprise operations and the vulnerability of
the server to internal and external attack. Risk management also affects the
decision to apply patches and fixes. Rather than blindly applying every patch
Key fingerprint
FA27by
2F94
998D FDB5
DE3Dshould
F8B5 06E4
A169 4E46
and
hotfix that=isAF19
released
vendors,
a process
be developed
to
evaluate the criticality and applicability to the software patch. This is where
configuration management, risk management and patch management merge. If
a server’s configuration is well documented, a decision as to whether a patch
© SANS Institute 2003,
As part of the Information Security Reading Room.
Author retains full rights.
ut
ho
rr
eta
ins
fu
ll r
igh
ts
needs to be applied becomes easier to make. The risk assessment as to
whether to apply the patch should include the risks of not patching the reported
vulnerability, extended downtime, impaired functionality and lost data. Anyone
responsible for government IT security must follow the Federal Information
Security Management Act (FISMA) of 2002. This act spells out the information
security responsibilities of all agencies of the federal government. Section 301,
subchapter III, paragraph 3544, subparagraph (b) spells out the responsibilities
of federal agencies to develop, document and implement an agency-wide
information security program. This is the section that addresses patch
management through the following guidelines: implemented policies must be
based on risk assessments, cost effectively reduce information security risk to an
acceptable level, and ensure that information security is addressed throughout
Keylifecycle
fingerprint
AF19
FA27 2F94
998D
FDB5 DE3Dprocess
F8B5 06E4
4E46risk
the
of=the
system.
A patch
management
thatA169
includes
analysis and mitigation strategies, implementation of automated tools, and puts
in place a repeatable process to maintain the patch level of all enterprise
computing platforms will address all of these guidelines.
A good patch management plan consists of several phases. The plan outlined
below consists of seven. The actual number and order of the phases may vary
between organizations due to organizational size, structure or established
procedures but the basic process is the same. Where appropriate, tools are
identified to help automate some of the tasks.
,A
Phase 1 – Baseline and Harden
©
SA
NS
In
sti
tu
te
20
03
Gather and consolidate inventory data on every server, switch, router, printer,
laptop and desktop in the enterprise. Although this information can be collected
manually, ideally an automated tool linked to a database should be used. This
would enable data collection dynamically and help ensure that the data is always
current as opposed to static information collected manually. Data to be collected
should include hostname, location, IP address, MAC address, operating system
and current revision level. For servers collect their function and services actively
running.
Many inexperienced administrators accept the default options when installing
operating systems. If documentation on what services were installed as part of
the operating system installation is unavailable, consider running vulnerability
scans against the server to uncover unnecessary services that should be
disabled or removed. Use caution when securing workstations. Some
organizations are overzealous in locking down desktops and only make
distributing updates more difficult. For example, deploying the SMS client
requires server service to be running, file and print sharing enabled and remote
registry access enabled and running. These same items are often turned off or
disabled while hardening desktops. There are numerous tools available that will
Key fingerprint
FA27 2F94 and
998Da FDB5
06E4 A169
4E46 Many of
scan
systems =
forAF19
vulnerabilities
few ofDE3D
them F8B5
are described
below.
these are free of charge while others are expensive.
Microsoft provides for free the Security Configuration and Analysis (SCA) tool as
part of Windows 2000 and above. It can be launched from the Microsoft
© SANS Institute 2003,
As part of the Information Security Reading Room.
Author retains full rights.
©
SA
NS
In
sti
tu
te
20
03
,A
ut
ho
rr
eta
ins
fu
ll r
igh
ts
management Console (MMC). The SCA can be used to compare the host
configuration against a predetermined template. Microsoft includes several
templates with Windows 2000 and XP or additional templates can be obtained
from other sources such as the Center for Internet Security (CISecurity.org). The
SCA will fix security holes however caution should be exercised before doing so.
Make sure that the consequences of making changes to a system are fully
understood and in any event, only implement changes one or two at a time and
only on test systems first.
The Center for Internet Security (CIS) also has available free benchmarking and
scoring tools for Windows 2000 and NT, Linux, Solaris and HP-UX. These are
host-based tools and are designed not to impact the systems or applications of
the host that they are running on. The tools will compare the security
Key fingerprintof
= AF19
FA27
2F94against
998D FDB5
DE3D
F8B5 06E4
4E46
configuration
the test
system
a CIS
Benchmark
for A169
that operating
system. The results are displayed in an easy to understand scoring report and
detailed explanations of the meaning of the scores is provided. These tools are
useful for identifying configuration weaknesses and getting all machines to a
common baseline.
A free tool is available from Nessus (Nessus.Org) that will scan for security
vulnerabilities on multiple flavors of Linux and Unix as well as Windows. Nessus
is very powerful and easy to use. It will not make any assumptions about the
server configuration. It will scan all ports for running services and attempt to
exploit those it discovers. It is highly configurable through the use of plug-ins that
are targeted towards specific vulnerabilities such as FTP, remote file access and
DOS. Each plug-in has an even more targeted selection of specific
vulnerabilities to choose from such as whether anonymous FTP is enabled or
whether Solaris FTPd is configured to tell whether a user exists. Nessus takes
about 2 hours for a competent administrator to get up and running. In a
comparison test of seven vulnerability scanners in Network Computing
magazine, January 2001, Nessus was the top scorer against several commercial
scanners. Nessus found 15 of 17 vulnerabilities in the tests. Another key
strength of the Nessus scanner was the fact that if it made assumptions a service
that may not be entirely accurate, it warned of the assumption so that the
administrator could investigate more thoroughly. Other scanners reported false
positives requiring additional analysis by the operator. Through the use of the
Nessus Attack Scripting Language (NASL) administrators can script custom
probes and even attacks. The one noted weakness in the Nessus product is its
weak reporting capability. However, this was conducted in 2001 and the current
version should be significantly improved.
A different approach to vulnerability scanning is the QualysGuard Intranet
Scanner. This product is an appliance which can be plugged in and configured in
15 minutes. Compared to Nessus, QualysGuard didn’t report as many
vulnerabilities in comparison testing done by Federal Computer Week, its
Key fingerprint
= AF19 were
FA27 considered
2F94 998D FDB5
DE3D
F8B5 06E4 A169
reporting
capabilities
superior.
QualysGuard
cost 4E46
$2,995 for the
appliance as well as a licensing fee for the hosts.
Each server should also have an indication of it criticality to the enterprise
mission. The higher the rating, the more mission critical the system. Factors to
© SANS Institute 2003,
As part of the Information Security Reading Room.
Author retains full rights.
consider when determining the mission critical status of a system would include:
system role in the enterprise mission, impact on the mission of system down time
and time and effort required for disaster recovery. The mission critical status
translates into a risk level to the enterprise of the system being unavailable. This
risk factor becomes important when making the decision of if, when and how to
apply a patch. The servers in an enterprise can be divided into three
environments:
§
ho
rr
eta
ins
fu
ll r
igh
ts
Mission critical – an environment in which even one hour of
downtime will have a significant impact on the business service,
and availability is required at almost any price. Examples would be
e-commerce sites where downtime can translate into significant lost
Key fingerprintrevenue
= AF19 FA27
2F94 998Dconfidence.
FDB5 DE3D F8B5 06E4 A169 4E46
and consumer
§ Business critical – an environment in which business services
require continuous availability, but breaks in service for short
periods of time are not catastrophic. Examples would be payroll
processing servers, E-mail servers.
§ Business operational – an environment in which breaks in service
are not catastrophic. Examples include print servers, file servers,
E-mail gateways. (Radhakrishnan, p. 5)
In
sti
tu
te
20
03
,A
ut
Many organizations have situations where the responsibility for maintaining the
server hardware and operating system falls on one group but the maintenance of
the applications running on the server are the responsibility of another group. In
this situation it is vital that proper change management procedures be
implemented and adhered to. These servers should have standard hardware
configurations as far as that is possible with the constant advancements in
technology. For each server, develop a change control document. This
document should contain the function of the server, the primary and backup point
of contact including after hours contact information, any special procedures
required prior to making a configuration change, and detailed disaster recovery
procedures.
©
SA
NS
Patch managers should aware of security precautions in place in their
environment. If they do not personally manage the company firewall they should
obtain configuration information from the firewall administrator. Ensure that there
is available documentation as to what traffic is being allowed through to the
internal network. This will help in the evaluation of threats posed by known
vulnerabilities and assign a risk factor to them.
Once the data is gathered it should be documented and distributed to all system
owners. Put in place a process to keep the data current.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Phase 2 – Develop a Test Environment
Once the environment is baselined, build a test environment that mirrors the
© SANS Institute 2003,
As part of the Information Security Reading Room.
Author retains full rights.
production environment. At a minimum, the test environment should have test
servers representing all mission critical applications. Ideally, every type of
platform in the enterprise should be represented in the test environment. In
many cases, if applications are developed in house there should already be
servers that can be used for testing security patches.
eta
ins
fu
ll r
igh
ts
It may not be possible to maintain a test environment that mirrors the production
environment, especially for small organizations with tight IT budgets. In this
situation, patches should be deployed to the least critical, easily recoverable
servers first. These would be servers without a lot of data or applications that
need to be restored. An example would be print servers. These can be rebuilt
quickly from registry backups. Ideally, the organization should have multiple print
Key fingerprint
= AF19
FA27
2F94 between
998D FDB5
DE3D
F8B5a06E4
A169if4E46
servers
with the
queues
divided
them
in such
way that
one fails, a
user could find a print queue on another server that is in the same physical
location as the one on the failed server. When installing patches on E-mail
servers, update the gateway before the database server.
ho
rr
Personnel designated to evaluate patch stability should have expertise in mission
critical systems and be capable of verifying stability of systems after patch
installation.
sti
tu
te
20
03
,A
ut
One cost effective means of establishing a test lab is to use VMWare to create a
“Lab in a box”. While this method won’t account for hardware variables in patch
testing, it is a good way to test patch compatibility with the OS as well as any
applications that are running on production servers. VMWare supports Windows
as well as Linux operating systems. A replica of the production environment can
exist on a single piece of hardware allowing the patch testers to evaluate multiple
configurations of operating systems and applications and their interaction with
each other before and after patch installation.
In
Phase 3 – Develop Backout Plan
©
SA
NS
Before any patch is installed, a full backup of all data and server configuration
information must be made. Best practices for disaster recovery recommend
periodic testing of the restore process to ensure the integrity of the backed up
data. Create Emergency Repair disks for all servers after updating. This way, it
won’t have to be done before the next update.
When updating workstations, establish a group of test users who are the first to
obtain the new updates. After successful deployment to the test group, expand
to the rest of the enterprise. Users should be storing their critical data on
network shares and have minimal desktop customization to facilitate rapid
Key fingerprint
= AF19
FA27 2F94
998D FDB5 DE3D F8B5 06E4 A169 4E46
restoration
from
a standard
image.
© SANS Institute 2003,
As part of the Information Security Reading Room.
Author retains full rights.
Phase 4 – Patch Evaluation and Collection
©
SA
NS
In
sti
tu
te
20
03
,A
ut
ho
rr
eta
ins
fu
ll r
igh
ts
Keeping current with hotfixes and updates can be a daunting task. It is important
to be able to quickly evaluate which updates are critical, which ones are merely
useful and which ones are unnecessary. An automated tool makes this job a
little easier by either maintaining a database of monitored systems and their
patch status or scanning them on demand. These results are then compared to
a database of the ideal configuration and systems needing to be updated are
identified. Gartner Group has identified nine functional requirements that should
be considered by enterprises that are considering automated solutions for patch
management:
1. The solution should be able to create and maintain an inventory of server
Key fingerprint
= AF19
FA27 2F94
998D FDB5
DE3D
F8B5 06E4
A169
4E46 without
and desktop
systems.
It should
be able
to discover
new
systems
requiring the sistribution of an agent.
2. The automated solution should be able to provide information about
installed service packs and patches for the operating system as well as
each major installed component.
3. It should be able to evaluate patch prerequisites. This will reduce the
labor requirements of patch management.
4. The automated solution should maintain a current, dynamically refreshed
inventory of patches and information about them. This will help the
enterprise prioritize patch installations based on the criticality from a
security perspective.
5. The automated solution should be able to report the patches that are
needed by each individual server and workstation.
6. The automated solution should support role-based administration and
system grouping. This allows the workload to be distributed among
groups of system owners.
7. This may be obvious but automated “patch management tools should
provide patch distribution and installation functions, including the ability to
automate the installation of patches that require intervention”. (Nicolett,
p.3)
8. Since Microsoft still dominates the desktop environment, most patch
management solutions have greater Microsoft support. That is beginning
to change and as will be described later, some are beginning to add Unix,
Linux and even Novell support.
9. There are two types of automated solutions. Agentless architectures rely
on scans of target machines to determine their update status. This type is
easier to set up and configure but consumes more network bandwidth to
push out patches. Agent based systems are more efficient users of
network bandwidth and provide more functionality but they are also have
higher deployment and maintenance costs. However, effective patch
Key fingerprint
= AF19especially
FA27 2F94“with
998Drespect
FDB5 DE3D
F8B5users,
06E4 A169
4E46
management,
to mobile
is likely
to require
the functiona …
Purchase answer to see full
attachment