SlideShare a Scribd company logo
1 of 13
AUG 2013
Vicky Ames
IS Security
Patch Management
Program Training
Agenda
 What is Patch Management?
 Why is it important?
 Which patches are we applying?
 How do we manage patches?
 When do we patch?
 Who is responsible?
 Future Plans
2
What is Patch Management?
Part of our overall Vulnerability Management strategy
Patches are released by vendors to address issues
identified with their code
 Often security related
 Sometimes performance or functionality related
 Patch Management is the formal program we use to address the
need to apply these patches to our systems
 Identify available patches
 Select patches to be applied
 Ensure they are applied according to our policy
 Tested to ensure no negative impact
 Validate they have been applied
3
Why is Patch Management important?
Patches generally address security issues that if left
unpatched could lead to
 Denial of Service
 Viruses, Worms, other Malware
 Data exfiltration
 Other malicious activities
 Malicious code is generally available to take advantage of
significant vulnerabilities within two days from patch release
 Defense in depth
4
Which patches are we applying?
 Microsoft
 OS patches
 Middleware patches
 Open Source (AIX, Solaris, Red Hat)
 OS patches
 Web Servers
 Apache, Tomcat and IIS
 Databases
 Those that can be patched will be when patches are released and
through service packs
 Thus far we have had 0 issues caused by a patch pushed by this
program
 Rebooting systems has uncovered issues related to the system or the
application
 Other underlying conditions are revealed after patches are applied
 Good to have happen during patching
 During scheduled maintenance window
 Teams are already engaged and can diagnose quickly
5
How do we manage patches?
 All systems (servers and workstations) are subject to monthly patching
 Lab systems excluded for now
 Leverage existing maintenance windows
 Vulnerability Management Team meets monthly to decide which patches
to apply
 All servers are assigned to 1 of 4 patch groups
 Group 1 intended to be DEV
 Group 2 intended to be QAS/INFRA
 Group 3 intended to be PROD
 Group 4 intended to be for manual patching
 Ensure we patch systems in Group 1 or 2 before we get to Group 3 so
we can test patches before they hit production
 Adhere to Change Management process
6
When do we patch?
 2nd
Tuesday of every month is “Patch Tuesday”
 Team meets the next day to determine which patches to push
 Group 1 patched the following Sunday 00:01 – 11:59
 Group 2 patched the following Sunday 00:01 – 11:59
 Group 3 patched the following Sunday 00:01 – 11:59
 Group 4 patched the following Sunday 00:01 – 11:59
 Schedule posted on ITCM Sharepoint site
 Quarterly extended maintenance window
7
When do we patch?
 Exceptions Process
 Request should be submitted 5 business days in advance of the
patch window
 Open a service desk ticket
 Required information
 System name(s)
 Application(s) impacted
 Justification for exception request
 Exclusion date requested
 Date patches will be applied
 Granted by Vulnerability Management Program Manager
 Backup is Director Information Security
 Only granted for 1 patch cycle
 If needed for longer we will discuss alternative solutions
8
Who is responsible?
 Wintel and Open Source Teams
 SME
 Apply patches
 Contract Team
 Middleware
 Testing
 Security Team
 Program oversight and validation
 System Owners
 Some patching
 Some testing
9
Future Plans
 Citrix systems late 2013
 Expect to incorporate more 3rd
party Middleware in 2014
10
Appendix
Appendix A – Patch Schedule
Appendix B - Links
11
Appendix A – Patch Schedule
12
Month Security Meeting Group 1 (Dev/Test) Group 2 (Infrastructure/QAS) Group 3 (Production/Network)
1/1/2013 Wednesday, January 09, 2013 Sunday, January 13, 2013 Sunday, January 20, 2013 Saturday, January 26, 2013
2/1/2013 Wednesday, February 13, 2013 Sunday, February 17, 2013 Sunday, February 24, 2013 Sunday, March 03, 2013
3/1/2013 Wednesday, March 13, 2013 Sunday, March 17, 2013 Sunday, March 24, 2013 Sunday, March 31, 2013
4/1/2013 Wednesday, April 10, 2013 Sunday, April 14, 2013 Sunday, April 21, 2013 Saturday, April 27, 2013
5/1/2013 Wednesday, May 15, 2013 Sunday, May 19, 2013 Sunday, May 26, 2013 Sunday, June 02, 2013
6/1/2013 Wednesday, June 12, 2013 Sunday, June 16, 2013 Sunday, June 23, 2013 Sunday, June 30, 2013
7/1/2013 Wednesday, July 10, 2013 Sunday, July 14, 2013 Sunday, July 21, 2013 Saturday, July 27, 2013
8/1/2013 Wednesday, August 14, 2013 Sunday, August 18, 2013 Sunday, August 25, 2013 Sunday, September 01, 2013
9/1/2013 Wednesday, September 11, 2013 Sunday, September 15, 2013 Sunday, September 22, 2013 Sunday, September 29, 2013
10/1/2013 Wednesday, October 09, 2013 Sunday, October 13, 2013 Sunday, October 20, 2013 Saturday, October 26, 2013
11/1/2013 Wednesday, November 13, 2013 Sunday, November 17, 2013 Sunday, November 24, 2013 Sunday, December 01, 2013
12/1/2013 Wednesday, December 11, 2013 Sunday, December 15, 2013 Sunday, December 22, 2013 Sunday, December 29, 2013
Green indicates extended maintenance window
Appendix B - Links
 Security Policies - Patch Management Policy is IT-AP-SEC-008-01
– http://sharepointportal/Departments/InformationTechnology/ITDL/Adminis
trative%20Policies/Forms/AllItems.aspx
 ITCM Site - patch schedule is on the right under Links
– http://sharepointportal/Departments/InformationTechnology/RFC/Default.
aspx
 Microsoft Security Bulletins
– http://technet.microsoft.com/en-us/security/bulletin
 Information Security Sharepoint site
– http://sharepointportal/Departments/InformationTechnology/InfoSecurity/
default.aspx
13

More Related Content

What's hot

Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices Ivanti
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionVishal Kumar
 
Reflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site ScriptingReflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site ScriptingInMobi Technology
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouKevin Fealey
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Getting Started with API Security Testing
Getting Started with API Security TestingGetting Started with API Security Testing
Getting Started with API Security TestingSmartBear
 
Os Command Injection Attack
Os Command Injection AttackOs Command Injection Attack
Os Command Injection AttackRaghav Bisht
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASPMarco Morana
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability AssesmentDedi Dwianto
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N NessusUtkarsh Verma
 
Overview of secret management solutions and architecture
Overview of secret management solutions and architectureOverview of secret management solutions and architecture
Overview of secret management solutions and architectureYuechuan (Mike) Chen
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisAndrey Apuhtin
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowSymantec Security Response
 

What's hot (20)

Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices
 
Broken access controls
Broken access controlsBroken access controls
Broken access controls
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
 
Reflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site ScriptingReflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site Scripting
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Wannacry
WannacryWannacry
Wannacry
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Getting Started with API Security Testing
Getting Started with API Security TestingGetting Started with API Security Testing
Getting Started with API Security Testing
 
Os Command Injection Attack
Os Command Injection AttackOs Command Injection Attack
Os Command Injection Attack
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
Application Security
Application SecurityApplication Security
Application Security
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
Overview of secret management solutions and architecture
Overview of secret management solutions and architectureOverview of secret management solutions and architecture
Overview of secret management solutions and architecture
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
Ssrf
SsrfSsrf
Ssrf
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
 

Viewers also liked

Growth hacking done the right way - our experience building 10+ companies - f...
Growth hacking done the right way - our experience building 10+ companies - f...Growth hacking done the right way - our experience building 10+ companies - f...
Growth hacking done the right way - our experience building 10+ companies - f...Founders
 
Building Business Relationships
Building Business RelationshipsBuilding Business Relationships
Building Business RelationshipsSV.CO
 
Wannier90: Band Structures, Tips and Tricks
Wannier90: Band Structures, Tips and TricksWannier90: Band Structures, Tips and Tricks
Wannier90: Band Structures, Tips and TricksJonathan Skelton
 
オンプレとクラウドのHadoopを比較して僕の思うとこ
オンプレとクラウドのHadoopを比較して僕の思うとこオンプレとクラウドのHadoopを比較して僕の思うとこ
オンプレとクラウドのHadoopを比較して僕の思うとこYu Yamada
 
How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)
How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)
How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)VirtualTech Japan Inc.
 
Binary Search - Design & Analysis of Algorithms
Binary Search - Design & Analysis of AlgorithmsBinary Search - Design & Analysis of Algorithms
Binary Search - Design & Analysis of AlgorithmsDrishti Bhalla
 
今さら聞けない人のためのDocker超入門 CentOS 7.2対応版
今さら聞けない人のためのDocker超入門 CentOS 7.2対応版今さら聞けない人のためのDocker超入門 CentOS 7.2対応版
今さら聞けない人のためのDocker超入門 CentOS 7.2対応版VirtualTech Japan Inc.
 
3. Stack - Data Structures using C++ by Varsha Patil
3. Stack - Data Structures using C++ by Varsha Patil3. Stack - Data Structures using C++ by Varsha Patil
3. Stack - Data Structures using C++ by Varsha Patilwidespreadpromotion
 
Introduction to poloxy - proxy for alerting
Introduction to poloxy - proxy for alertingIntroduction to poloxy - proxy for alerting
Introduction to poloxy - proxy for alertingIKEDA Kiyoshi
 
PMP PMBOK 5th Ch 11 Project Risk Management
PMP PMBOK 5th Ch 11 Project Risk ManagementPMP PMBOK 5th Ch 11 Project Risk Management
PMP PMBOK 5th Ch 11 Project Risk ManagementAbdullah Ahmed, PMP, RMP
 

Viewers also liked (14)

Evaluation q3
Evaluation q3Evaluation q3
Evaluation q3
 
Evaluation
EvaluationEvaluation
Evaluation
 
Growth hacking done the right way - our experience building 10+ companies - f...
Growth hacking done the right way - our experience building 10+ companies - f...Growth hacking done the right way - our experience building 10+ companies - f...
Growth hacking done the right way - our experience building 10+ companies - f...
 
Building Business Relationships
Building Business RelationshipsBuilding Business Relationships
Building Business Relationships
 
COBIIR 2017
COBIIR 2017COBIIR 2017
COBIIR 2017
 
Wannier90: Band Structures, Tips and Tricks
Wannier90: Band Structures, Tips and TricksWannier90: Band Structures, Tips and Tricks
Wannier90: Band Structures, Tips and Tricks
 
oracle service bus
oracle service busoracle service bus
oracle service bus
 
オンプレとクラウドのHadoopを比較して僕の思うとこ
オンプレとクラウドのHadoopを比較して僕の思うとこオンプレとクラウドのHadoopを比較して僕の思うとこ
オンプレとクラウドのHadoopを比較して僕の思うとこ
 
How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)
How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)
How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)
 
Binary Search - Design & Analysis of Algorithms
Binary Search - Design & Analysis of AlgorithmsBinary Search - Design & Analysis of Algorithms
Binary Search - Design & Analysis of Algorithms
 
今さら聞けない人のためのDocker超入門 CentOS 7.2対応版
今さら聞けない人のためのDocker超入門 CentOS 7.2対応版今さら聞けない人のためのDocker超入門 CentOS 7.2対応版
今さら聞けない人のためのDocker超入門 CentOS 7.2対応版
 
3. Stack - Data Structures using C++ by Varsha Patil
3. Stack - Data Structures using C++ by Varsha Patil3. Stack - Data Structures using C++ by Varsha Patil
3. Stack - Data Structures using C++ by Varsha Patil
 
Introduction to poloxy - proxy for alerting
Introduction to poloxy - proxy for alertingIntroduction to poloxy - proxy for alerting
Introduction to poloxy - proxy for alerting
 
PMP PMBOK 5th Ch 11 Project Risk Management
PMP PMBOK 5th Ch 11 Project Risk ManagementPMP PMBOK 5th Ch 11 Project Risk Management
PMP PMBOK 5th Ch 11 Project Risk Management
 

Similar to Patch Management - 2013

Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018Dinis Cruz
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-SessionRyan Faircloth
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancementcyberprosocial
 
XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the...
XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the...XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the...
XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the...The Linux Foundation
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygieneThiagu Haldurai
 
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015Minded Security
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksErdem Erdogan
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And RiskChandrashekhar B
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage PreventionIRJET Journal
 
Behavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesBehavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesIAEME Publication
 
Behavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesBehavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesIAEME Publication
 
Seven habits of effective devops - DevOps Day - 02/02/2017
Seven habits of effective devops - DevOps Day - 02/02/2017Seven habits of effective devops - DevOps Day - 02/02/2017
Seven habits of effective devops - DevOps Day - 02/02/2017Clara Feuillet
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk AnalysisBrett Leonard
 
Intro To Continuous Delivery
Intro To Continuous DeliveryIntro To Continuous Delivery
Intro To Continuous DeliveryBhanu Musunooru
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 

Similar to Patch Management - 2013 (20)

Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
 
XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the...
XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the...XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the...
XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the...
 
Experience Sharing on School Pentest Project
Experience Sharing on School Pentest ProjectExperience Sharing on School Pentest Project
Experience Sharing on School Pentest Project
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
 
Test plan
Test planTest plan
Test plan
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
 
Behavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesBehavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniques
 
Behavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesBehavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniques
 
Seven habits of effective devops - DevOps Day - 02/02/2017
Seven habits of effective devops - DevOps Day - 02/02/2017Seven habits of effective devops - DevOps Day - 02/02/2017
Seven habits of effective devops - DevOps Day - 02/02/2017
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
 
Intro To Continuous Delivery
Intro To Continuous DeliveryIntro To Continuous Delivery
Intro To Continuous Delivery
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 

Patch Management - 2013

  • 1. AUG 2013 Vicky Ames IS Security Patch Management Program Training
  • 2. Agenda  What is Patch Management?  Why is it important?  Which patches are we applying?  How do we manage patches?  When do we patch?  Who is responsible?  Future Plans 2
  • 3. What is Patch Management? Part of our overall Vulnerability Management strategy Patches are released by vendors to address issues identified with their code  Often security related  Sometimes performance or functionality related  Patch Management is the formal program we use to address the need to apply these patches to our systems  Identify available patches  Select patches to be applied  Ensure they are applied according to our policy  Tested to ensure no negative impact  Validate they have been applied 3
  • 4. Why is Patch Management important? Patches generally address security issues that if left unpatched could lead to  Denial of Service  Viruses, Worms, other Malware  Data exfiltration  Other malicious activities  Malicious code is generally available to take advantage of significant vulnerabilities within two days from patch release  Defense in depth 4
  • 5. Which patches are we applying?  Microsoft  OS patches  Middleware patches  Open Source (AIX, Solaris, Red Hat)  OS patches  Web Servers  Apache, Tomcat and IIS  Databases  Those that can be patched will be when patches are released and through service packs  Thus far we have had 0 issues caused by a patch pushed by this program  Rebooting systems has uncovered issues related to the system or the application  Other underlying conditions are revealed after patches are applied  Good to have happen during patching  During scheduled maintenance window  Teams are already engaged and can diagnose quickly 5
  • 6. How do we manage patches?  All systems (servers and workstations) are subject to monthly patching  Lab systems excluded for now  Leverage existing maintenance windows  Vulnerability Management Team meets monthly to decide which patches to apply  All servers are assigned to 1 of 4 patch groups  Group 1 intended to be DEV  Group 2 intended to be QAS/INFRA  Group 3 intended to be PROD  Group 4 intended to be for manual patching  Ensure we patch systems in Group 1 or 2 before we get to Group 3 so we can test patches before they hit production  Adhere to Change Management process 6
  • 7. When do we patch?  2nd Tuesday of every month is “Patch Tuesday”  Team meets the next day to determine which patches to push  Group 1 patched the following Sunday 00:01 – 11:59  Group 2 patched the following Sunday 00:01 – 11:59  Group 3 patched the following Sunday 00:01 – 11:59  Group 4 patched the following Sunday 00:01 – 11:59  Schedule posted on ITCM Sharepoint site  Quarterly extended maintenance window 7
  • 8. When do we patch?  Exceptions Process  Request should be submitted 5 business days in advance of the patch window  Open a service desk ticket  Required information  System name(s)  Application(s) impacted  Justification for exception request  Exclusion date requested  Date patches will be applied  Granted by Vulnerability Management Program Manager  Backup is Director Information Security  Only granted for 1 patch cycle  If needed for longer we will discuss alternative solutions 8
  • 9. Who is responsible?  Wintel and Open Source Teams  SME  Apply patches  Contract Team  Middleware  Testing  Security Team  Program oversight and validation  System Owners  Some patching  Some testing 9
  • 10. Future Plans  Citrix systems late 2013  Expect to incorporate more 3rd party Middleware in 2014 10
  • 11. Appendix Appendix A – Patch Schedule Appendix B - Links 11
  • 12. Appendix A – Patch Schedule 12 Month Security Meeting Group 1 (Dev/Test) Group 2 (Infrastructure/QAS) Group 3 (Production/Network) 1/1/2013 Wednesday, January 09, 2013 Sunday, January 13, 2013 Sunday, January 20, 2013 Saturday, January 26, 2013 2/1/2013 Wednesday, February 13, 2013 Sunday, February 17, 2013 Sunday, February 24, 2013 Sunday, March 03, 2013 3/1/2013 Wednesday, March 13, 2013 Sunday, March 17, 2013 Sunday, March 24, 2013 Sunday, March 31, 2013 4/1/2013 Wednesday, April 10, 2013 Sunday, April 14, 2013 Sunday, April 21, 2013 Saturday, April 27, 2013 5/1/2013 Wednesday, May 15, 2013 Sunday, May 19, 2013 Sunday, May 26, 2013 Sunday, June 02, 2013 6/1/2013 Wednesday, June 12, 2013 Sunday, June 16, 2013 Sunday, June 23, 2013 Sunday, June 30, 2013 7/1/2013 Wednesday, July 10, 2013 Sunday, July 14, 2013 Sunday, July 21, 2013 Saturday, July 27, 2013 8/1/2013 Wednesday, August 14, 2013 Sunday, August 18, 2013 Sunday, August 25, 2013 Sunday, September 01, 2013 9/1/2013 Wednesday, September 11, 2013 Sunday, September 15, 2013 Sunday, September 22, 2013 Sunday, September 29, 2013 10/1/2013 Wednesday, October 09, 2013 Sunday, October 13, 2013 Sunday, October 20, 2013 Saturday, October 26, 2013 11/1/2013 Wednesday, November 13, 2013 Sunday, November 17, 2013 Sunday, November 24, 2013 Sunday, December 01, 2013 12/1/2013 Wednesday, December 11, 2013 Sunday, December 15, 2013 Sunday, December 22, 2013 Sunday, December 29, 2013 Green indicates extended maintenance window
  • 13. Appendix B - Links  Security Policies - Patch Management Policy is IT-AP-SEC-008-01 – http://sharepointportal/Departments/InformationTechnology/ITDL/Adminis trative%20Policies/Forms/AllItems.aspx  ITCM Site - patch schedule is on the right under Links – http://sharepointportal/Departments/InformationTechnology/RFC/Default. aspx  Microsoft Security Bulletins – http://technet.microsoft.com/en-us/security/bulletin  Information Security Sharepoint site – http://sharepointportal/Departments/InformationTechnology/InfoSecurity/ default.aspx 13