RSI Security

What Is Patch Management?

Security measures are never foolproof. No matter how many precautions companies and users take, threat actors always find a new point of entry to exploit. Identifying and fixing vulnerabilities requires time, and there lies one of the greatest challenges — deploying sound fixes within a tight time constraint.

Imagine you get a deep cut on your arm that will likely require stitches. While on the way to the hospital, you try to reduce blood loss by using a BAND-AID. Even though the BAND-AID might not be the ideal fix, it mitigates the immediate concern – blood loss. Patches are kind of like a cut; you have to know whether a patch will fix the problem or decide if the problem requires “stitches,” all within a short time window.

Whether a patch fixes a small problem or serves as a temporary security measure while a more viable solution is designed, developing a strong patch management plan will help enterprises stay more secure and better serve their customers. Does your business know how to test and install patches for your computer system? Read on to learn what is patch management and how it can help you today.

 

What is patch management?

Patching refers to the insertion of code to “patch” a vulnerability or functionality issue in a system. Patch implementation usually takes place via a system update (e.g., removing old features, updating drivers). Patch Management refers to how a company identifies, develops, and implements those patches. Rather than starting from scratch, patches serve as a relatively expedient fix. If necessary, a more lasting solution to the bug may come later in the form of a new product release. For example, operating system (OS) software updates become available as companies identify vulnerabilities (like Microsoft’s Patch Tuesdays) but a completely new version of an OS offers new functionality aspects (e.g., Windows 8 vs 10).

Approaches to patch management generally encompass a combination of tools — internal methods, managing products, and outsourcing. Internal development refers to companies, like Microsoft, developing and launching patches for their products (e.g., Windows OS). The vendor provides the patch. In contrast, patch management systems are products that identify, manage, and, in some cases, fix the bugs in the code. Patch products range from fully autonomous systems to scalable management tools. It is up to the entity to choose a patch management product(s) that best fits the company’s needs. Automated patch products reduce the necessary manpower and offer customization to an institution’s needs.

 

Assess your Patch Management program

 

Why Is Patch Management Important?

The Equifax breach in 2017 compromised the personally identifiable information (PII) of over 146 million customers. One of the causes of this breach stemmed from a known vulnerability that went unpatched, allowing the hackers to sift through data for approximately 76 days. Vulnerabilities in code, when identified, require swift action. Ignoring or postponing a patch can result in loss of revenue and seriously damage a company’s reputation. The ultimate goal of patching is to mitigate the window of attack once a vulnerability is identified.

While it may sound like a simple issue of time, patching requires coordination and resources. Since patching first emerged in the 1970s, coding has evolved. Subsequently, patching evolved. In the past, entities implemented patches on a set schedule. However, that patching process enables hackers to better plan their attacks. The technology environment today requires a different approach to patch management. The greatest hurdle today remains the factor of time – time to identify, time to develop a fix, time to deploy the patch. The accelerating pace of technological advancements increasingly forces companies to shift from a reactive to proactive patch management strategy.

 

 

Patching Recommendations and Regulations

Most government regulations (e.g., NIST Cyber Security Framework, PCI DSS) mention patch management in their requirements, but the specificity of each framework varies. Part of the problem is that each enterprise and sector requires a different approach. A software company will need to approach security patch management from a different angle than a financial institution. The National Institution for Standards and Technology (NIST) updated its patch recommendations in 2013. NIST’s Guide to Enterprise Patch Management Technologies addresses the growth of automated patching versus manual patching. The guide provides implementation examples, highlights the challenges of patch management, and notes certain best practices. For example, the guide recommends the following two points for improving efficiency when it comes to patch management:

  1. Use a phased approach
  2. Establish standard security techniques when implementing new applications within a company

Likewise, the Department of Homeland Security (DHS) published recommendations for Patch Management Control Systems in 2008. Although somewhat outdated, the guidelines still serve as a viable stepping stone on which to develop newer patch management practices. Overall, the DHS outlined a seven-phase process which includes a configuration management program, patch management plan, backup/archive plan, patch testing schedule, incident response plan, disaster recovery plan, and unit patching operation outline. Some specific best practices in those steps include exposure reviews and maintaining a software/code library. The DHS guide serves as a helpful resource that offers valuable reference materials and tips for developing a tailored patch management strategy.

Moreover, considering international policies provides broader insight into global patch management practices. In France, the CSSF published three circulars addressing patch concerns in the cloud computing environment and outsourcing standards within the financial industry. The standards acknowledge a shift from physical to electronic monetary transactions and highlight issues regarding credit, e-payment, and investment institutions.

NNIT Security Insights, based in Denmark, suggests a 10-step process for developing a patch management strategy.

  1. Identify the requirements or policies that govern the industry (whether by region, country, etc.).
  2. Develop a prioritization scale. What targets are deemed most valuable or deserve the most patch attention? Then, use that scale to outline the frequency at which patches should occur.
  3. Consolidate the systems running. The goal is to minimize the threat surface by system hardening. Make sure systems run only the necessary services/applications. Consolidating the systems/services running will reduce the extent of patching required and better utilize available resources.
  4. Outline a backup plan. Conducting risk assessments and noting alternative controls will help improve recovery time when patching doesn’t go exactly to plan.
  5. Review internal and external vulnerabilities. It is sometimes easy to focus only on internal operations, but any interactions with outside vendors increase the level of risk a company faces.
  6. Write activation and maintenance guidelines that specify system configuration policies. For example, outline item identification and registration policies as well as update procedures.
  7. Outline a decommission policy. Much like experts warn you to shred any valuable documents before throwing them away, it is important to thoroughly deactivate devices or programs before retiring them. For example, make sure a device no longer has access to a system and cannot be accidentally reactivated. Furthermore, this stage encompasses monitoring and compliance reporting.  
  8. Develop general patch procedures including when to service a system, how to report security or functionality issues, and how to implement patches as quickly as possible.
  9. Create a technical patch checklist for technicians (e.g., a list including checking back-ups, disk usage, and hardware malfunctions). This list should be similar to a pre-flight checklist that pilots follow before takeoff. It is not designed for all employees; rather, it focuses solely on the technical aspect of patching.
  10. Evaluate key performance indicators (KPI) and designate a chain of communication for reporting.

Observing other patch management practices nationally and internationally will help enterprises pick the best tools and methods for their needs. No one plan will fit all institutions; rather, it’s figuring out which combination uses resources most efficiently and produces the highest quality outcome.

 

 

Patch Management Plan

A 2018 report found that 86 percent of product vulnerabilities have a patch available within 24 hours of identification. This percentage  increased from 2012 likely due to improved communication channels. When institutions share their knowledge about vulnerabilities and solutions, time-to-patch becomes quicker and the impact more widespread. The following general tips will help each entity tailor a patch management plan to best fit their needs.

Need Patch Help?

Patch management sometimes seems like an unwinnable race, one in which the runner, no matter how hard he tries, will always be several steps behind his opponent. Despite the fact that hackers will always seek to exploit new vulnerabilities, new patch management tools and methods continue to improve the patch management environment. Staying current with the latest patch news, employing automated patch management tools, and establishing a designated patch management team will aid institutions in shifting from a reactive to a proactive patching strategy. For help with your patch management policy and cybersecurity solutions, contact RSI Security and request a demo today.

 

Exit mobile version