Patch management

advertisement

Patch management:

increasingly a facet of effective risk management

Marcus alldrick

Securelondon conference, 28 jUly 2009

IF the attacker has a greater understanding of its target then it has the advantage

© Lloyd’s 2 patch management SecureLondon 0709 v01

Criminal attackers are now driven by monetization cost and profitability

3 patch management SecureLondon 0709 v01 © Lloyd’s

Patching and other protective measures increases attackers’ monetization cost and reduces their profitability

© Lloyd’s 4 patch management SecureLondon 0709 v01

Trends

Continued rapid evolution of attack strategies / sophistication

Web applications increasingly vulnerable and targeted

Decrease in mass mailing viruses and worms

Trojans increasing, notably in data stealing malware

2007: 52%, 2008: 87%, Q109 93%

Source: TrendLabs, 2009

Multiple threat vectors employed, e.g. PDFs, Flash multimedia, Java

Motivation predominantly illicit economic gain

More financial investment in vulnerability exploitation due to ROI

Intellectual property emerging as the target

Zero day vulnerabilities increasing

5

Difficult education messages to business and customers, persist patch management SecureLondon 0709 v01 © Lloyd’s

Trends cont.

5,491 vulnerabilities in 2008, 19% increase on 2007

High severity vulnerabilities decreased from 4% to 2% in 2008

Medium vulnerabilities increased from 61% to 67% in 2008

80% of vulnerabilities classified as easily exploitable (74% in 2007)

63% of vulnerabilities affected Web applications (59% in 2007)

Mozilla browsers: 99 vulnerabilities

Internet Explorer: 47

Apple Safari:

Opera:

40

35

Google Chrome: 11

XSS, SQL injection and file include vulnerabilities predominate

6

95% of attacked vulnerabilities were client-side, 5% server-side

Source: Symantec Global Internet Security Threat Report, 2009 patch management SecureLondon 0709 v01 © Lloyd’s

Top exploitation: Conficker

SC Magazine www.bbc.co.uk/news

The Guardian

Microsoft offers $250,000 bounty for authors of the Conficker worm

SC Magazine

"The days of people doing this because they're bored are mostly over. We would expect that the person who controls this thing will try to auction off parts of the network that they have created."

Thomas Cross IBM ISS

DarkReading.com

7 patch management SecureLondon 0709 v01 © Lloyd’s

Top 10 Vendors with the most vulnerability disclosures

8

9

10

4

5

6

7

2

3

Ranking Vendor

1 Microsoft

Apple

Sun

Joomla!

IBM

Oracle

Mozilla

Drupal

Cisco

TYPO3

Disclosures

3.16%

3.04%

2.19%

2.07%

2.00%

1.65%

1.43%

1.42%

1.23%

1.23%

Source: X-Force 2008 Trend & Risk Report, IBM, 2009

© Lloyd’s 8 patch management SecureLondon 0709 v01

Top 10 operating systems with the most vulnerabilities reported

8

9

10

4

5

6

7

1

3

Ranking Vendor

1 Apple Mac OS X Server

Apple Mac OS X

Linux Kernel

Sun Solaris

Microsoft Windows XP

Microsoft Windows 2003 Server

Microsoft Windows Vista

Microsoft Windows 2000

Microsoft Windows 2008

IBM AIX

Disclosures

14.3%

14.3%

10.9%

7.3%

5.5%

5.2%

5.1%

4.8%

4.1%

3.7%

Source: X-Force 2008 Trend & Risk Report, IBM, 2009

© Lloyd’s 9 patch management SecureLondon 0709 v01

Recent surveys

Technology is one of the highest priorities for companies yet many companies do not know what risks they now face

47% of surveyed European companies use vulnerability scanning tools

Source: The Global State of Information Security Survey, 2008

65% of respondents conduct vulnerability scanning at least annually

Both emerging technology and increasing sophistication of threats seen as less of a barrier last year compared to 2007

~70% saw inadequate Patch Management as a medium/high issue

Virus & worm attacks, email attacks and phishing/pharming dominate

Source: Protecting what matters, The 6 th Annual Global Security Survey, Deloitte, 2009

Economic distress will exacerbate the situation

Security seen as a cost and therefore at risk of reduction

10

Increased opportunity and incentive for attackers patch management SecureLondon 0709 v01 © Lloyd’s

Main consequences of exploitation

Consequence

Bypass security

Data manipulation

Denial of Service

File manipulation

Gain access

Gain privileges

Obtain information

11 patch management SecureLondon 0709 v01

Description

Circumvention of security measures, e.g. firewall, proxy, IDS/IPS, anti-malware defences

Manipulation of data used/stored by host and used by service or application

Crash/disrupt a service or system to take down a network

Create, delete, modify, overwrite or read files

Obtain local/remote access including execution of code/commands

Obtain local privileges

Obtain file and path names, source code, passwords, configuration details, etc.

© Lloyd’s

Reactive remediation

Malware infection and system failure remain the incident types that require most staff time to fix

7% of infections took 11-50 man days to recover

1% of infections took >100 man days

12 patch management SecureLondon 0709 v01

Source: Information Security Breaches Survey 2008, BERR

© Lloyd’s

Constraints

Patch overload

Different builds

Complexity of patches

Device connectivity

Resource constraints

Testing timescales

Testing infrastructure

Application dependency

Lack of / inadequate asset inventories

Lack of / inadequate configuration management

Scheduling / downtime / business impact

13 patch management SecureLondon 0709 v01 © Lloyd’s

Patch Management process

Identify

Patch &

Vuln.

Assess risk of

Vuln.

Perform

Impact analysis

Test

Patch

Pilot

Patch

Roll-out

Patch

Review and

Report

Patch rest of devices

© Lloyd’s 14 patch management SecureLondon 0709 v01

Vulnerability Management

Vulnerability Management

Security Alert

Management

Patch

Management

Incident

Management

Vulnerability Assessment

Security alerts – proactive

Patch management - preventative

Security incidents – reactive / curative

Vulnerability assessment – indicative monitoring

15 patch management SecureLondon 0709 v01 © Lloyd’s

ITIL V3 Process Summary

Service Strategy

Business Requirements

IT Policies & Strategies

Service Operation

Event Management

Incident Management

Problem Management

Patch Management

Service Transition

Change Management

Asset & Config Mgmt patch management SecureLondon 0709 v01 16

Service Design

Service Level Mgmt

Availability Mgmt

Info Security Mgmt

© Lloyd’s

Key considerations

Mandate through agreed Patch Management strategy and policy

Senior Management buy-in and support essential

Conflicts between patching and business operations must be resolved

Schedule patch activity as BAU but allow for emergencies

Prioritise patches based on risk to organisation

Implement standard builds

Reduce local admin privileges

Maintain asset inventories / configuration management

Consider application whitelisting

Formulate integrated process and automate wherever possible

Allocate adequate resource, both management and line

17 patch management SecureLondon 0709 v01 © Lloyd’s

To summarise…..

Patch management is increasingly business critical given reliance on technology infrastructure

Should be proactive and preventative, not reactive and curative

Business impact reduction from a risk perspective should be key driver

Key is understanding the motivation, opportunity and risk to the attacker

Should be viewed as part of a bigger picture, an integrated process

Supported by defence in depth strategies

Automated tools are essential but so are the right people

Knowledge is power: know your vulnerabilities and where they are

End user estates increasingly as important as server estates

Flexibility and agility is crucial

© Lloyd’s 18 patch management SecureLondon 0709 v01

19 patch management SecureLondon 0709 v01 © Lloyd’s

Download