Security Patch Management Brodie Desimone, CISSP Senior Technology Specialist BrodieD@microsoft.com Michael Nowacki, CISSP Senior Security Technology Specialist mnowacki@microsoft.com Microsoft Solutions for Security Customer Feedback Inadequate Communications, Guidance, and Training Inconsistent Patching Experience Reduce Frequency, Quantity of Patches Multiple, Incomplete Patch Management Tools Inconsistent Patch Quality Addressing The Situation • Security and patch management priority #1 – bar none – at Microsoft • Microsoft problem • Industry problem • Ongoing battle with malicious hackers • Need comprehensive, tactical and strategic approach to addressing the situation • Trustworthy Computing Initiative • Security framework and focus • Patch Management Initiative Microsoft Solutions for Security TWC Overview Microsoft Solutions for Security Microsoft’s Security Framework SD3 + Communications Secure by Design Secure by Default Secure in Deployment Reduce attack surface area Unused features off by default Only require minimum privilege Protect, detect, defend, recover, manage Process: How to’s, architecture guides People: Training Clear security commitment Full member of the security community Microsoft Security Response Center Microsoft Solutions for Security Communications Secure architecture Security aware features Reduce vulnerabilities in the code Patch Management Initiative Goals Informed & Prepared Customers Accurate, effective, easily discoverable, and timely information Process and best practice guidance; training Consistent & Superior Update Experience Consistent formats and mechanisms for discovery, applicability evaluation, uninstallation, etc. of patches and updates Superior Patch Quality Consistently high quality Consistently small patch sizes Minimize reboots on patch installation Best Patch & Update Management Solutions The right set of functionality Easy to deploy, administer, use Interoperability with third party solutions Cross divisional team with mission to resolve key patch management issues Improve the Patching Experience New Patch Policies • Extending support to June 2004 • Windows 2000 SP2 • Windows NT SP6a • Non-emergency security patches on a monthly release schedule • Allows for planning a predictable monthly test and deployment cycle • Packaged as individual patches that can be deployed together • Achieves benefits of security rollup with increased flexibility Patches for emergency issues will still release immediately Improve the Patching Experience Patch Enhancements Your Need Our Response Reduce patch complexity By late 2004: Consolidation to 2 patch installers for W2k and later, SQL 2000, Office & Exchange 2003; all patches will behave the same way (update.exe, MSI 3.0) Reduce risk of patch deployment Now: Increased internal testing; customer testing of patches before release By mid-2004: Rollback capability for W2k generation products and later (MSI 3.0 patches) Reduce patch size By late 2004: Substantially smaller patches for W2k generation and later OS & applications (Delta patching technology, next generation patching installers) Reduce downtime Now: Continued focus on reducing reboots By late 2004: 30% of critical updates on Windows Server 2003 SP1 installed w/o rebooting (“hot patching”) Improved tools consistency By mid-2004: Consistent results from MBSA, SUS, SMS, Windows Update (will all use SUS 2.0 engine for detection) Improved tools capabilities May 2004: Microsoft Update (MU) hosts patches for W2k server, and over time SQL 2000, Office & Exchange 2003 By mid-2004: SUS 2.0 receives content from MU & adds Microsoftfor Solutions for Security capabilities targeting, basic reporting and rollback Solution Components Analysis Tools • Microsoft Baseline Security Analyzer (MBSA) • Office Inventory Tool Online Update • Windows Update Services • Office Update Content Repositories Management Tools Prescriptive Guidance • Windows Update Catalog • Office Download Catalog • Microsoft Download Center • Automatic Updates (AU) feature in Windows • Software Update Services (SUS) • Systems Management Server (SMS) • Microsoft Guide to Security Patch Management • Patch Management Using SUS • Patch Management Using SMS Patch Management Guidance • Prescriptive guidance from Microsoft for effective patch management • Uses Microsoft Operations Framework (MOF) • Based on ITIL* (defacto standard for IT best practices) • Details requirements for effective patch management: • • • • Technical & operational pre-requisites Operational processes & how technology supports them Daily, weekly, monthly & as-needed tasks to be performed Testing options • Three patch management guidance offerings • Microsoft Guide to Security Patch Management** • Patch Management using Software Update Services*** • Patch Management using Systems Management Server*** *Information Technology Infrastructure Library **Emphasizes security patching & overall security management ***Comprehensive coverage of patch management using the specified technology Delivering Security Technologies • Windows XP SP2 • • • • Improved network protection Safer email and Web browsing Enhanced memory protection Beta by end of 2003, RTM based on customer feedback • Windows Server 2003 SP1 • • • • Role-based security configuration Inspected remote computers Inspected internal environment RTM H2 CY04 Microsoft Solutions for Security Client Shielding Enhancements What it is Security enhancements that protect computers, even without patches; Included in Win XP SP2 (H104) with more to follow What it does Helps stop network-based attacks, file attachment viruses and buffer overruns Key Features • Network Protection: Improved ICF protection turned on by default • Safer email: Improved attachment blocking for Outlook Express and IM • Safer browsing: Better user controls to prevent malicious ActiveX controls and Spyware • Memory Protection: Improved compiler checks (/GS) to reduce stack overruns Enterprise Shielding Enhancements Enterprise Quarantine What it is What it does Key Features Only clients that meet corporate security standards are allowed to connect; included in Win 2003 SP1 (H204) with more to follow Protects enterprise assets from infected computers • Enforces specific corporate security requirements such as patch level, AV signature state and firewall state • Ensure these standards are met when • VPN connections are made by remote clients • Wired or wireless connections are made by rogue and transient clients Today Extended support Monthly patch releases Baseline guidance Community Investments H1 04 Windows XP SP2 Patching enhancements SMS 2003 SUS 2.0 Microsoft Update Broad training H2 04 Windows Server 2003 SP1 Security technologies Next generation inspection Microsoft Solutions for Security Future NGSCB Windows hardening Continued OS-level security technologies Security Resources • New: IT Pro Security Zone • http://www.microsoft.com/technet/security/community • New: Security Guidance for the Enterprise • http://www.microsoft.com/technet/security/bestprac • Subscribe to MSRC notifications: • http://www.microsoft.com/securitynotification • Trustworthy Computing: • http://www.microsoft.com/mscorp/innovation/twc/ • Hot Fix & Security Bulletin Search: • http://www.microsoft.com/technet/treeview/default.asp? url=/technet/security/current.asp Microsoft Solutions for Security © 2003 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft Solutions for Security