Jump to content
  • Sign Up
×
×
  • Create New...

How to conduct security patch validation and verification


Recommended Posts

  • Diamond Member



How to conduct security patch validation and verification

Validation and verification are important steps in the security patch management lifecycle. They help to determine the impact of a patch on the security and efficiency of an organization’s IT assets.

Patch validation is the process of examining newly available patches to see which ones apply to the organization’s IT environment and then testing the chosen patches to determine if they could cause problems. The software patch testing process usually requires building a test environment that mimics a representative segment of the overall infrastructure.

Verify patch deployment

The patch verification process that follows, in contrast, involves checking related files, binary versions and registry settings to confirm that a patch has taken effect. If the patch management tool used by the organization is not capable of doing so, the process must be done manually. In addition, a vulnerability scanner can be used to verify that vulnerabilities the patch is intended to mitigate are no longer present or exploitable.

For verification to be trustworthy, the patch management tool used to deploy the security patch must have the ability to monitor patched systems after deployment. It should also verify that the security patch was properly installed and identify any post-deployment issues by running smoke tests. The tool should also keep track of the systems that have been patched. If the tool is unable to do all these things, the organization needs to create a

This is the hidden content, please
to complete the different verification tasks.

Review patch status

The organization’s change control procedure — be it a tool, ticket or form — should be updated as each step is completed and a report generated to record the status of each patch. These reports can be generated by the patch management tool or the change management system used by the organization. The reports get distributed to the appropriate staff, including the patch management team and IT personnel involved in the review phase.

Each report should contain the following information:

  • Number of systems successfully patched.
  • Number of systems that ******* patching or were unsuccessfully patched.
  • Summary indicating why the failures occurred and the follow-up steps.
  • Summary of reboot request reporting.
  • Number of systems that were omitted from the process, which is typically provided in the accompanying exception report.
  • Summary indicating why these systems were omitted from the process and any temporary workarounds implemented.
  • Summary of reporting effectiveness.

KPIs should be developed for the patch management procedure. They enable the organization to measure the effectiveness and efficiency of its patch management initiatives. KPIs for patch management include the ones seen in the figure here.

These KPIs can be used to measure the effectiveness of an organization’s patch management program.

Those responsible for patch management should regularly analyze the reports and use the KPIs and other information to answer the following questions about their remediation and response processes:

  • How effective is the process?
  • If there is a high rate of ********, what are the contributing factors?
  • Where can improvements to the patch management procedure be made?

This information establishes the baseline performance of the patch management procedure, which can then be used to expose the accuracy and effectiveness of the patch against attacks. Completing this last phase of the procedure ensures an organization’s patch management initiative is proactive.

Michael Cobb, CISSP-ISSAP, is a renowned security author with more than 20 years of experience in the IT industry.

Felicia Nicastro is author of the book Security Patch Management.





This is the hidden content, please

#conduct #security #patch #validation #verification

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.