百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

IV. The Processes for Patch Management

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 
 
To build an effective patch management process that manages the risks from both external (i.e. vulnerabilities of the information systems) and internal factors (i.e. vulnerabilities related to patch itself), universities are recommended to consider the following practices:

1. Security and Patch Information Sources  
 
A key component of patch management process is the intake and vetting of information regarding both security issues and patch release. The IT security staff must know which security issues and software updates are relevant to universities' environment. Designated staff for each information system should be appointed to keep up to date on newly released patches and vulnerabilities through trusted sources, such as Microsoft Security Bulletin and Symantec. By leveraging the IT asset register, universities can determine whether all existing or critical information systems are covered by the patch management process.
 
Universities should also maintain close contact with the vendors of their key information systems, including operating systems, applications and network devices, to facilitate timely response to emerging vulnerabilities.
 
2. Patch Prioritisation and Scheduling
 
Universities should first establish a patch cycle that guides the normal application of patches to information systems. The cycle can be triggered regularly or event-driven. For example, weekly security patch update can be activated on universities PC desktops and laptops that use Windows platform as their operating systems. The IT security staff could also manually initiate the cycle when there is release of service packs or important security patches. In either instance, deployment of patches should be made based on system criticality, availability requirements and available resources.
 
Once the patch cycle is established, universities should integrate the prioritisation and scheduling process.
 
In general, patches are prioritised by first categorised into "security-related" and "everything else" types. Higher priority should be given to "security-related" patches by default. A more detailed prioritisation can be performed by referring to the following criteria: 
  • Vendor Reported Criticality - vendor reported criticality is a key input for calculating a patch's significance. Higher priority should be considered for "High" vendor reported criticality as reverse engineering of the patches may result in severe security breaches.
  • System / Service Criticality - The relative importance of the information systems or data is another valuable input for assessing the priority. The servers of a university's financial system or student information registry are more critical than desktops and should be patched first.
  • System Exposure - information systems accessible by external users or the general public are exposed to higher probability of malicious attacks and therefore require close attention by the universities.

For example, vulnerabilities or program bugs for DMZ systems could lead to more dangerous security incidents than those related to internal file servers. Therefore, the relevant patches of DMZ systems should enter the patch cycle earlier.

Based on the nature of the IT environments and service characteristics, each university should establish a prioritisation matrix, which provides clear guidance and criteria on patch prioritisation for the responsible IT security staff.

3. Patch Validation and Testing

The patch testing process begins with the acquisition of the patches and continues through acceptance testing after production deployment. 

The first step is the verification of the patches' source and integrity. This step helps ensure that the update is valid and has not been maliciously or accidentally altered. Responsible IT security staff could rely on digital signatures (e.g. MD5), checksum (e.g. Cyclic Redundancy Check) or any other integrity verification means to perform patch validation. 
 
Once a patch has been determined valid, it is should be tested in a test environment which mimics at least the majority of the production infrastructure to ensure a smooth and predictable rollout. Based on the system criticality, availability requirements, available resources and patch priority, the testing could be simply making sure system reboots or a series of detailed test scenarios. Access to the testing environment must be restricted to authorised testers to prevent tested patches from being replaced by malicious files.
 
For patches on important systems, the testing should include the fallback procedures to ensure that the critical services or operations supported by these systems can be restored correctly and timely.
 
4. Change Management
 
All patch management activities should follow the change management procedures established by the universities. Authorisations on source of system patches, acceptance testing and installation should be obtained from respective system owners and universities' IT management.
 
Like any critical changes to universities' IT environment, patch deployment plans submitted through change management must have associated fallback plans that defines the handling procedures if something goes wrong during or as a result of the application of a patch.
 
5. Patch Installation and Deployment
 
Deployment of patches should be conducted in a controlled manner.
 
Universities should not grant users and even administrators of critical information systems with the access rights to apply patches arbitrarily. The IT security staff must ensure adequate level of physical and logical access controls being implemented to restrict any unauthorised patch deployment. Only authorised IT operations staff are permitted to install patches in the production environment or initiate fallback plan if required.
 
6. Other Work-arounds
 
Occasionally patches released by software vendor may not be 100% compatible with the existing software of the universities, resulting in system crashes, instability or various kinds of disruption to the production environment. While deployment of these patches may not be feasible in the above cases, the risks and vulnerabilities associated to the patch should not be overseen. The following actions should be considered as an alternative: 
  • Report to software vendor and obtain an understanding of the underlying risks for not deploying the patch, and request an updated version of the patch
  • Implement additional security controls to mitigate associated risks
  • Shut down the software function where the vulnerability resides so that it cannot be exploited

V. Summary

While patches are necessary components for most of today's information systems to continuously refine and enhancement their functionalities and security measures, it may also lead to risks and vulnerabilities if they are improperly utilised by users.
 
A successful patch management process encompasses the identification, prioritization, scheduling, testing, change management and deployment of patches in a structured manner. It ensures that vulnerabilities or errors in the information systems, hardware and firmware are timely remediated without causing any adverse effect.
 
To achieve an effective patch management practice, universities management should establish relevant policy and procedures and appoint appropriate IT staff resources to maintain and monitor the execution of the above process.

 

Reference:
http://www.patchmanagement.org/pmessentials.asp
http://www.microsoft.com/technet/security/bulletin/advance.mspx
http://www.symantec.com/

 
百家乐套利| 百家乐官网的注码技巧| 瑞丰国际开户| 至尊百家乐下载| e世博百家乐官网攻略| 大发888城| 澳门百家乐赌| 百家乐官网官网站| 做生意店子内风水布置| 公海百家乐官网的玩法技巧和规则 | 百家乐官网经验之谈| 大发888娱乐游戏注册| 菲律宾百家乐娱乐| 百家乐技巧-百家乐开户指定代理网址 | 游戏厅百家乐技巧| 百家乐合理的投注法| 蓝盾百家乐平台租用| 宝博百家乐娱乐城| 百家乐筹码桌| 百家乐最好打法与投注| 网上百家乐优博| 2024年九运的房屋风水| 百家乐官网77scs官| 真钱百家乐赌博| 百家乐扑克发牌器| 最新百家乐的玩法技巧和规则| 太阳百家乐官网路单生| 百家乐官网百战百胜| 百家乐微笑心法搜索| 百家乐对保| 威尼斯人娱乐城怎么样| 百家乐官网鞋业| 真钱百家乐官网公司哪个好| 百家乐官网免费试玩游戏| 娱乐城新用户送彩金| 肇庆市| 罗山县| 网上百家乐官网骗人吗| 真人百家乐官网现金游戏| 澳门赌场筹码| 香港六合彩报|