SlideShare une entreprise Scribd logo
1  sur  30
Developing Patch
Management
Best Practices
An In-Depth Technical Webcast
Today’s Agenda




             Introduction



             Curing Your Patch Management Headache
             with Lessons Learned from the Field
             • Laying the Groundwork
             • Before Patch Tuesday
             • On Patch Tuesday
             • After Patch Tuesday


             Q&A
Today’s Panelists




    Russ Ernst              Jim Czyzewski
    Group Product Manager   Supervisor – Clinical Desktop Support
    Lumension               MidMichigan Medical Center




3
Why Is Patch Management Important
                                      Sources of Endpoint Risk

                                                 5%
                                              Zero-Days

                                                30%
                                          Missing Patches

                                                65%
                                          Misconfigurations

    Today’s Endpoint Security Stack

                 AV
                Device
                Control
              Application
               Control
        Patch & Configuration
            Management

4
Benefits of a Solid Patching Process
Malware Costs Money    Patching Reduces Target Size




5
Patch Management Best Practices

                    Laying the
                   Groundwork




                     Patch
     After Patch                 Before Patch
                   Management
      Tuesday                      Tuesday
                    Process




                    On Patch
                    Tuesday


6
Laying the Groundwork
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Discover Assets




8
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Agent Maintenance
Lumension Reporting Services (LRS)




9
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Classify Value and Risk




10
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Establish Workflow and Groups
Users                 Roles




Groups




11
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Identify Test Groups




12
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Staff Training
Learning Portals




13
Before Patch Tuesday
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Prepare Resources
• Schedule Resources
     » Allocate IT resources for Patch Tuesday while also integrating additional patch
       release schedules from third-party applications, such as Adobe, Apple (ad
       hoc), Java and so forth
     » Review the patching needs of any internally-developed applications and/or
       custom patches and consider deploying these patches as part of the monthly
       patch cycle


• Reserve Down-Time for Servers
     » Reserve time slots to be able to deploy patch updates to any mission-critical
       servers within 72 hours of the Patch Tuesday release




15
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Watch for Pre-Announcements




16
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Confirm Reporting Up-to-Date




17
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Deploy Missing Updates and Pre-Requisites




18
On Patch Tuesday
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Study Information and Security Briefings




• Important information to consider when understanding the impact of Patch
  Tuesday on your environment includes:
     •   Bulletin Severity
     •   Whether or not the vulnerability is known/publicly disclosed at the time of release
     •   Does the vendor know of any active exploits at the time of release
     •   Value of the asset being patched


20
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Prioritize Potential Patches




21
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Test and Install Patches
• Follow Internal Change Control Planning and Approval Process
• Staged Testing
     • Deploy applicable bulletins to test groups
     • Ensure successful deployment before rollout to additional groups in the environment
     • Pay special attention to impact to custom-developed, internal applications
• Staged Deployments




22
After Patch Tuesday
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Deployment History




24
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Calculate Time to Deploy




25
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Monitor for Compliance
Mandatory Baseline




26
Laying the Groundwork | Week Before | Patch Tuesday | Week After


Continuous Improvement
• Checks and Balances
     » Review the Effectiveness of Patch Tuesday Remediations


• Metrics Improvement
     » Modify system settings, distribution parameters and so forth to further optimize
       the system for next month’s updates
     » WAN optimization, polling frequency and minimizing the patches being
       detected can all help further optimize performance
     » Look for computers that did not receive updates at all or those that took
       unusually long to receive updates




27
Q&A
More Information
• Free Vulnerability Scanner Tool                    • Get a Quote (and more)
 » Discover all OS and application vulnerabilities    http://www.lumension.com/
   on your network                                    vulnerability-management/
   http://www.lumension.com/Resources/                patch-management-software/buy-now.aspx#6
   Security-Tools/Vulnerability-Scanner.aspx


• Lumension® Patch and Remediation
 » Online Demo Video:
   http://www.lumension.com/
   vulnerability-management/
   patch-management-software/demo.aspx
 » Free Trial (virtual or download):
   http://www.lumension.com/
   vulnerability-management/
   patch-management-software/free-trial.aspx




29
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255

1.888.725.7828
info@lumension.com
http://blog.lumension.com

Contenu connexe

Plus de Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

Plus de Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Best practices for Patch Management: An In-Depth Technical Presentation

  • 2. Today’s Agenda Introduction Curing Your Patch Management Headache with Lessons Learned from the Field • Laying the Groundwork • Before Patch Tuesday • On Patch Tuesday • After Patch Tuesday Q&A
  • 3. Today’s Panelists Russ Ernst Jim Czyzewski Group Product Manager Supervisor – Clinical Desktop Support Lumension MidMichigan Medical Center 3
  • 4. Why Is Patch Management Important Sources of Endpoint Risk 5% Zero-Days 30% Missing Patches 65% Misconfigurations Today’s Endpoint Security Stack AV Device Control Application Control Patch & Configuration Management 4
  • 5. Benefits of a Solid Patching Process Malware Costs Money Patching Reduces Target Size 5
  • 6. Patch Management Best Practices Laying the Groundwork Patch After Patch Before Patch Management Tuesday Tuesday Process On Patch Tuesday 6
  • 8. Laying the Groundwork | Week Before | Patch Tuesday | Week After Discover Assets 8
  • 9. Laying the Groundwork | Week Before | Patch Tuesday | Week After Agent Maintenance Lumension Reporting Services (LRS) 9
  • 10. Laying the Groundwork | Week Before | Patch Tuesday | Week After Classify Value and Risk 10
  • 11. Laying the Groundwork | Week Before | Patch Tuesday | Week After Establish Workflow and Groups Users Roles Groups 11
  • 12. Laying the Groundwork | Week Before | Patch Tuesday | Week After Identify Test Groups 12
  • 13. Laying the Groundwork | Week Before | Patch Tuesday | Week After Staff Training Learning Portals 13
  • 15. Laying the Groundwork | Week Before | Patch Tuesday | Week After Prepare Resources • Schedule Resources » Allocate IT resources for Patch Tuesday while also integrating additional patch release schedules from third-party applications, such as Adobe, Apple (ad hoc), Java and so forth » Review the patching needs of any internally-developed applications and/or custom patches and consider deploying these patches as part of the monthly patch cycle • Reserve Down-Time for Servers » Reserve time slots to be able to deploy patch updates to any mission-critical servers within 72 hours of the Patch Tuesday release 15
  • 16. Laying the Groundwork | Week Before | Patch Tuesday | Week After Watch for Pre-Announcements 16
  • 17. Laying the Groundwork | Week Before | Patch Tuesday | Week After Confirm Reporting Up-to-Date 17
  • 18. Laying the Groundwork | Week Before | Patch Tuesday | Week After Deploy Missing Updates and Pre-Requisites 18
  • 20. Laying the Groundwork | Week Before | Patch Tuesday | Week After Study Information and Security Briefings • Important information to consider when understanding the impact of Patch Tuesday on your environment includes: • Bulletin Severity • Whether or not the vulnerability is known/publicly disclosed at the time of release • Does the vendor know of any active exploits at the time of release • Value of the asset being patched 20
  • 21. Laying the Groundwork | Week Before | Patch Tuesday | Week After Prioritize Potential Patches 21
  • 22. Laying the Groundwork | Week Before | Patch Tuesday | Week After Test and Install Patches • Follow Internal Change Control Planning and Approval Process • Staged Testing • Deploy applicable bulletins to test groups • Ensure successful deployment before rollout to additional groups in the environment • Pay special attention to impact to custom-developed, internal applications • Staged Deployments 22
  • 24. Laying the Groundwork | Week Before | Patch Tuesday | Week After Deployment History 24
  • 25. Laying the Groundwork | Week Before | Patch Tuesday | Week After Calculate Time to Deploy 25
  • 26. Laying the Groundwork | Week Before | Patch Tuesday | Week After Monitor for Compliance Mandatory Baseline 26
  • 27. Laying the Groundwork | Week Before | Patch Tuesday | Week After Continuous Improvement • Checks and Balances » Review the Effectiveness of Patch Tuesday Remediations • Metrics Improvement » Modify system settings, distribution parameters and so forth to further optimize the system for next month’s updates » WAN optimization, polling frequency and minimizing the patches being detected can all help further optimize performance » Look for computers that did not receive updates at all or those that took unusually long to receive updates 27
  • 28. Q&A
  • 29. More Information • Free Vulnerability Scanner Tool • Get a Quote (and more) » Discover all OS and application vulnerabilities http://www.lumension.com/ on your network vulnerability-management/ http://www.lumension.com/Resources/ patch-management-software/buy-now.aspx#6 Security-Tools/Vulnerability-Scanner.aspx • Lumension® Patch and Remediation » Online Demo Video: http://www.lumension.com/ vulnerability-management/ patch-management-software/demo.aspx » Free Trial (virtual or download): http://www.lumension.com/ vulnerability-management/ patch-management-software/free-trial.aspx 29
  • 30. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com http://blog.lumension.com