百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

IV. The Processes for Patch Management

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 
 
To build an effective patch management process that manages the risks from both external (i.e. vulnerabilities of the information systems) and internal factors (i.e. vulnerabilities related to patch itself), universities are recommended to consider the following practices:

1. Security and Patch Information Sources  
 
A key component of patch management process is the intake and vetting of information regarding both security issues and patch release. The IT security staff must know which security issues and software updates are relevant to universities' environment. Designated staff for each information system should be appointed to keep up to date on newly released patches and vulnerabilities through trusted sources, such as Microsoft Security Bulletin and Symantec. By leveraging the IT asset register, universities can determine whether all existing or critical information systems are covered by the patch management process.
 
Universities should also maintain close contact with the vendors of their key information systems, including operating systems, applications and network devices, to facilitate timely response to emerging vulnerabilities.
 
2. Patch Prioritisation and Scheduling
 
Universities should first establish a patch cycle that guides the normal application of patches to information systems. The cycle can be triggered regularly or event-driven. For example, weekly security patch update can be activated on universities PC desktops and laptops that use Windows platform as their operating systems. The IT security staff could also manually initiate the cycle when there is release of service packs or important security patches. In either instance, deployment of patches should be made based on system criticality, availability requirements and available resources.
 
Once the patch cycle is established, universities should integrate the prioritisation and scheduling process.
 
In general, patches are prioritised by first categorised into "security-related" and "everything else" types. Higher priority should be given to "security-related" patches by default. A more detailed prioritisation can be performed by referring to the following criteria: 
  • Vendor Reported Criticality - vendor reported criticality is a key input for calculating a patch's significance. Higher priority should be considered for "High" vendor reported criticality as reverse engineering of the patches may result in severe security breaches.
  • System / Service Criticality - The relative importance of the information systems or data is another valuable input for assessing the priority. The servers of a university's financial system or student information registry are more critical than desktops and should be patched first.
  • System Exposure - information systems accessible by external users or the general public are exposed to higher probability of malicious attacks and therefore require close attention by the universities.

For example, vulnerabilities or program bugs for DMZ systems could lead to more dangerous security incidents than those related to internal file servers. Therefore, the relevant patches of DMZ systems should enter the patch cycle earlier.

Based on the nature of the IT environments and service characteristics, each university should establish a prioritisation matrix, which provides clear guidance and criteria on patch prioritisation for the responsible IT security staff.

3. Patch Validation and Testing

The patch testing process begins with the acquisition of the patches and continues through acceptance testing after production deployment. 

The first step is the verification of the patches' source and integrity. This step helps ensure that the update is valid and has not been maliciously or accidentally altered. Responsible IT security staff could rely on digital signatures (e.g. MD5), checksum (e.g. Cyclic Redundancy Check) or any other integrity verification means to perform patch validation. 
 
Once a patch has been determined valid, it is should be tested in a test environment which mimics at least the majority of the production infrastructure to ensure a smooth and predictable rollout. Based on the system criticality, availability requirements, available resources and patch priority, the testing could be simply making sure system reboots or a series of detailed test scenarios. Access to the testing environment must be restricted to authorised testers to prevent tested patches from being replaced by malicious files.
 
For patches on important systems, the testing should include the fallback procedures to ensure that the critical services or operations supported by these systems can be restored correctly and timely.
 
4. Change Management
 
All patch management activities should follow the change management procedures established by the universities. Authorisations on source of system patches, acceptance testing and installation should be obtained from respective system owners and universities' IT management.
 
Like any critical changes to universities' IT environment, patch deployment plans submitted through change management must have associated fallback plans that defines the handling procedures if something goes wrong during or as a result of the application of a patch.
 
5. Patch Installation and Deployment
 
Deployment of patches should be conducted in a controlled manner.
 
Universities should not grant users and even administrators of critical information systems with the access rights to apply patches arbitrarily. The IT security staff must ensure adequate level of physical and logical access controls being implemented to restrict any unauthorised patch deployment. Only authorised IT operations staff are permitted to install patches in the production environment or initiate fallback plan if required.
 
6. Other Work-arounds
 
Occasionally patches released by software vendor may not be 100% compatible with the existing software of the universities, resulting in system crashes, instability or various kinds of disruption to the production environment. While deployment of these patches may not be feasible in the above cases, the risks and vulnerabilities associated to the patch should not be overseen. The following actions should be considered as an alternative: 
  • Report to software vendor and obtain an understanding of the underlying risks for not deploying the patch, and request an updated version of the patch
  • Implement additional security controls to mitigate associated risks
  • Shut down the software function where the vulnerability resides so that it cannot be exploited

V. Summary

While patches are necessary components for most of today's information systems to continuously refine and enhancement their functionalities and security measures, it may also lead to risks and vulnerabilities if they are improperly utilised by users.
 
A successful patch management process encompasses the identification, prioritization, scheduling, testing, change management and deployment of patches in a structured manner. It ensures that vulnerabilities or errors in the information systems, hardware and firmware are timely remediated without causing any adverse effect.
 
To achieve an effective patch management practice, universities management should establish relevant policy and procedures and appoint appropriate IT staff resources to maintain and monitor the execution of the above process.

 

Reference:
http://www.patchmanagement.org/pmessentials.asp
http://www.microsoft.com/technet/security/bulletin/advance.mspx
http://www.symantec.com/

 
做生意门口朝向| 百家乐官网玩法教学视频| 澳门百家乐现场真人版| 凤凰网上娱乐| 大家旺百家乐官网的玩法技巧和规则| 六合彩图库大全| 三公百家乐官网在哪里可以玩| 516棋牌游戏中心 官方版| 新濠百家乐官网娱乐场| 尊龙备用网址| 澳门百家乐要注意啥| 网上百家乐官网有哪些玩法| 百家乐椅子| 百家乐下对子的概率| 钱隆百家乐大师| 哪里有百家乐官网代理| 什么叫百家乐官网的玩法技巧和规则| 大发888官方网站| 战神百家乐娱乐| 凯旋门百家乐官网游戏| 二爷百家乐的玩法技巧和规则| 新利百家乐官网的玩法技巧和规则| 威尼斯人娱乐城赌博网站| 百家乐官网网上真钱娱乐场开户注册 | 百家乐的路图片| 澳门百家乐官网技巧皇冠网| 二八杠高手| 澳门百家乐海星王| 百家乐官网代理在线游戏可信吗网上哪家平台信誉好安全 | 澳门百家乐娱乐城注册| 百家乐官网赌场在线娱乐| 网上百家乐试| 永利高百家乐现金网| 百家乐官网是怎样算牌| 百胜百家乐官网软件| 脉动棋牌下载| 欧洲百家乐的玩法技巧和规则| 为什么百家乐官网玩家越来越多选择网上百家乐官网 | 百家乐官网筹码方形筹码| 金尊国际娱乐| 大发888娱乐城pt|