38
Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

Embed Size (px)

Citation preview

Page 1: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

1 Copyright © 2011 M. E. Kabay. All rights reserved.

PatchesCSH5 Chapter 40

“Managing Patches & Vulnerabilities”Peter Mell & Karen Kent Scarfone

Page 2: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

2 Copyright © 2011 M. E. Kabay. All rights reserved.

TopicsIntroduction to Patch &

Vulnerability ManagementWhy Use Automated Patching

Solutions?Patch & Vulnerability

Management ProcessPatch & Vulnerability

Management IssuesSummary of Major

Recommendations

Page 3: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

3 Copyright © 2011 M. E. Kabay. All rights reserved.

Introduction to Patch & Vulnerability ManagementVulnerabilities

FlawsCan be exploited by malicious entitiesObtain unauthorized access / privileges

PatchesCode to fix flaws / bugsCan add functionalityOr repair flawsMay lag behind vulnerability disclosures

Patch & vulnerability managementSystematic processes to prevent exploits

Page 4: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

4 Copyright © 2011 M. E. Kabay. All rights reserved.

Why Use Automated Patching Solutions? (1) Vulnerabilities increasing rapidly

Jan – Dec 2007: US National Vulnerability Database* – 6691 new vulnerabilities (557/mo, 18/day)

Jan – Dec 2008: 5632Jan – Dec 2009: 5773

Damage can be severe: denial of service, data loss, loss of reputation, loss of business….

Cost of not mitigating damage = WTRW = workstationsT = time spent fixing problems or lost productivityR = cost/hour of T

*http://nvd.nist.gov/

Page 5: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

5 Copyright © 2011 M. E. Kabay. All rights reserved.

Why Use Automated Patching Solutions (2)

Manual monitoring for new patches and applying may be labor intensiveE.g., 10 min/day10 min/patch per workstation… and these costs may add up…Yet still remain cheaper than disaster

However, automated patching can be more cost effectiveAutomatically attend to new patchesDeploy them across entire networkAlso more reliable and quicker than manual

Page 6: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

6 Copyright © 2011 M. E. Kabay. All rights reserved.

Examples of Automated Patch Management Tools

PatchEasySymantec Altiris SuiteDesktop Central 7Shavlik NetChk Protect

These are examples, not endorsements.

Page 7: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

7 Copyright © 2011 M. E. Kabay. All rights reserved.

Patch Easy

Page 8: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

8 Copyright © 2011 M. E. Kabay. All rights reserved.

Symantec Altiris Suite

Page 9: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

9 Copyright © 2011 M. E. Kabay. All rights reserved.

Desktop Central 7

Page 10: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

10 Copyright © 2011 M. E. Kabay. All rights reserved.

Shavlik NetChk Protect

Page 11: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

11 Copyright © 2011 M. E. Kabay. All rights reserved.

Patch & Vulnerability Management ProcessRecommended ProcessCreating a System InventoryMonitoring for Vulnerabilities, Remediations &

ThreatsPrioritizing Vulnerability RemediationCreating Organization-Specific Remediation DBTesting RemediationsDeploying Vulnerability RemediationsDistributing Vulnerability & Remediation Info to

AdminsVerifying RemediationVulnerability Remediation Training

Page 12: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

12 Copyright © 2011 M. E. Kabay. All rights reserved.

Recommended ProcessOverviewPatch & Vulnerability Group (PVG)System Administrators (Sysadmins)

Page 13: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

13 Copyright © 2011 M. E. Kabay. All rights reserved.

Overview of Process

Create central, autonomous group for managing patches and vulnerabilities

May have single PVG or several in hierarchyShift patch administrators from sysadmins to

PVGReduce duplication of effortSave moneyReduce errors

Use standardized configurations for workstations and servers to degree possible

Keep careful track of inventory and topology

Page 14: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

14 Copyright © 2011 M. E. Kabay. All rights reserved.

Patch & Vulnerability Group (PVG)Define PVG to include INFOSEC + OPS

SysadminIntrusion detectionFirewall managementOperating systems expertsVulnerability scanners

May be full- or part-time depending on size, complexity of organization & systems

May rotate staff into group to spread knowledge

Page 15: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

15 Copyright © 2011 M. E. Kabay. All rights reserved.

PVG Duties1. Create system inventory2. Monitor for vulnerabilities, remediations & threats3. Prioritize vulnerability remediation4. Create organization-specific remediation database5. Conduct generic testing of remediations6. Deploy vulnerabilities remediations7. Distribute vulnerability & remediation information to

local system administrators8. Perform automated deployment of patches9. Configure automatic update of applications

wherever possible & appropriate10. Verify vulnerability remediation through NW & host

vulnerability scanning11. Vulnerability remediation training

Page 16: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

16 Copyright © 2011 M. E. Kabay. All rights reserved.

System Administrators (Sysadmins)

Responsible for ensuring that IT resources follow standard configuration defined for organization

Ensure that resources participate in automated patching system

Or if using manual patching, coordinate with PVGHandle exceptions

Trial systemsExperimental configurationsPrototypes under development

Page 17: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

17 Copyright © 2011 M. E. Kabay. All rights reserved.

Creating a System Inventory

Essential to know exactly what needs protection

IT InventoryUpdate constantly / real-timeUsually prefer organization-wide DBSuggested fields on p. 40-7Preferably use automated inventory agentsAlso use bar codes on all components

Systems, peripherals….CablingNetwork elements (routers, switches…)

Page 18: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

18 Copyright © 2011 M. E. Kabay. All rights reserved.

Grouping & Prioritizing IT Resources

Elements in inventory need priority levelsReflect degree of criticality

Impact of compromiseDependencies – critical patch for recovery

Can use FIPS PUB 199Standards for Security Categorization of

Federal Information and Information Systems

See next slide

Page 19: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

19 Copyright © 2011 M. E. Kabay. All rights reserved.

Get to Know the NIST CSRC

Page 20: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

20 Copyright © 2011 M. E. Kabay. All rights reserved.

NIST CSRC: FIPS 199

Page 21: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

21 Copyright © 2011 M. E. Kabay. All rights reserved.

Use of IT Inventory & Scope of Related Duties

Inventory is foundation of PVG operationsEnsure PVG knows which vulnerabilities to

look for & to respond toChecklist for ensuring that all vulnerable

systems remediatedPublication allows sysadmins to spot missing

or incorrect components & fix DBManagers, security personnel can also use

information productivelyBut restrict access according to

permissions as appropriateE.g., division / department / workgroup

Page 22: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

22 Copyright © 2011 M. E. Kabay. All rights reserved.

Monitoring for Vulnerabilities, Remediations & ThreatsTypes of Security Concerns

VulnerabilitiesRemediationsThreats (exploits,

malware)Be on lookout for

unauthorized…HardwareSoftwareConfigurations

Page 23: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

23 Copyright © 2011 M. E. Kabay. All rights reserved.

Tools for Monitoring Vulnerabilities, Remediations & ThreatsVendor Websites & mailing lists (product-

specific newsletters)Third-party Web sites (e.g., SANS, CERT-CC®,

various alert newsletters)Vulnerability scannersVulnerability databases

National Vulnerability DatabaseEnterprise patch management toolsOther notification tools

Page 24: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

24 Copyright © 2011 M. E. Kabay. All rights reserved.

CERT-CC®

Page 25: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

25 Copyright © 2011 M. E. Kabay. All rights reserved.

SANS Internet Storm Center

Page 26: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

26 Copyright © 2011 M. E. Kabay. All rights reserved.

The Register

Page 27: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

27 Copyright © 2011 M. E. Kabay. All rights reserved.

Prioritizing Vulnerability Remediation

Determine significance of threat or vulnerability

Determine existence, extent & spread of related malware & exploits

Determine risks involved in applying patch or nonpatch remediationUse external sources of informationPVG is not a research group

Page 28: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

28 Copyright © 2011 M. E. Kabay. All rights reserved.

Creating Organization-Specific Remediation DB

Enterprise patch-management tools establish DB for known inventory in organization

May have to maintain own small DB or manual list of exceptions

Include threat assessment informationUseful in business-continuity (BC) &

disaster recovery planning (DRP) Include copy of every patch used or planned

Can avoid problems of rush on Website

Page 29: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

29 Copyright © 2011 M. E. Kabay. All rights reserved.

Testing Remediations

Standardized configurations allow easy testing of patches on isolated systemsKeep standard for test & development onlyAvoid danger of installing bad patch on

production systemsEliminate need for redundant, costly testing

on all local systemsBut critically important to maintain validity of

system image so that patches really going to standard configs!

See extensive list of precautions for testing on pp 40.12 – 40.13 of text

Page 30: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

30 Copyright © 2011 M. E. Kabay. All rights reserved.

Deploying Vulnerability Remediations3 primary methods of remediation Applying security patch (“fix” or “hotfix”)

Modifies defective codeBe sure to download only from safe sites – vendor site

usually safe Configuration adjustment

Change parameter(s); e.g.,Disabling servicesChanging firewall settingsAltering router settingsModifying registry settings

Software removalGenerally advised to run only essential processes /

services on production systems

Page 31: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

31 Copyright © 2011 M. E. Kabay. All rights reserved.

Delaying Patch InstallationsSome patches have been discovered to be

defectiveCaused more problems than they solvedTherefore some admins are gun-shy: delay

installation of patches by reflexPVG should document, analyze & discuss

deviations from recommended installationsThreat levelRisk of compromiseConsequences of

compromise

Page 32: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

32 Copyright © 2011 M. E. Kabay. All rights reserved.

Distributing Vulnerability & Remediation Info to AdminsPrimary mechanism: automated

patch management software (PMS)

Emergencies (e.g., failure of PMS) may require alternative channelsPlan for these backup

channels in advanceMaintain securityEstablish authenticity of

patch instructionEstablish authenticity &

integrity of patch itself

Page 33: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

33 Copyright © 2011 M. E. Kabay. All rights reserved.

Verifying Remediation Must be sure patches have in fact been installed

Correctly &On all appropriate targets

Performing Vulnerability ScanningAutomated systems can locate

unpatched vulnerabilities independently

Also map network topology to identify undocumented systems

Reviewing Patch LogsUseful in detailed forensic-level analysisHelp identify installation problems, aborts

Checking Patch LevelsNAC* can check for patch levels (e.g., CISCO Clean

Access Agent)*Network Access Agent

Page 34: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

34 Copyright © 2011 M. E. Kabay. All rights reserved.

Vulnerability Remediation Training

Corporate policy may allow software other than what the PVG controls to be usedThus PVG will have to train local

sysadmins in patching processMust identify which software requires

manual monitoring for patchesCentralized patch distribution may not apply

to all systemsThen users may be involved in

collaboration to update systemsCritically important to convince users &

sysadmins of value of cooperation

Page 35: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

35 Copyright © 2011 M. E. Kabay. All rights reserved.

Patch & Vulnerability Management IssuesEnterprise Patching Solutions

Types of Patching SolutionsNonagent Patching SolutionsAgent-Based Patching SolutionsAdvantages & Disadvantages

Integrated SW Inventory CapabilitiesIntegrated Vulnerability Scanning CapabilitiesDeployment Strategies

Reducing Need to Patch by Smart PurchasingUsing Standardized ConfigurationsPatching After Security Compromise

§40.4 is beyond thelevel expected foran undergraduateIA mgmt course.

Page 36: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

36 Copyright © 2011 M. E. Kabay. All rights reserved.

Summary of Major Recommendations (1)1. Create patch & vulnerability group2. Continuously monitor for vulnerabilities,

remediations & threats3. Prioritize patch application & use phased

deployments as appropriate4. Test patches prior to deployment5. Deploy enterprise-wide automated patching

solutions6. Use automatically updating applications as

appropriate7. Create inventory of all IT assets

Page 37: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

37 Copyright © 2011 M. E. Kabay. All rights reserved.

Summary of Major Recommendations (2)

8. Use standardized configurations for IT resources as much as possible

9. Verify that vulnerabilities have been remediated.10.Consistently measure effectiveness of

organization’s patch & vulnerability management program and apply corrective actions as necessary

11. Train applicable staff on vulnerability monitoring and remediation techniques

12.Periodically test effectiveness of organization’s patch and vulnerability management program.

Page 38: 1 Copyright © 2011 M. E. Kabay. All rights reserved. Patches CSH5 Chapter 40 “Managing Patches & Vulnerabilities” Peter Mell & Karen Kent Scarfone

38 Copyright © 2011 M. E. Kabay. All rights reserved.

DISCUSSION