Patch Management

Patch Management
Picking the Low-Hanging Fruit
Why fixing third-party application vulnerabilities is at
the core of sound information security—and how to
make sure patch management is optimizing your
security posture.
May 2011
WP-EN-05-18-11
Patch Management: Picking the Low-Hanging Fruit
Overview
“Set it and forget it” might work for rotisserie ovens,
your DVR and maybe even data backups. But it’s
a bad strategy when it comes to patch manage-
Why do hackers use old vulnerabilities
to exploit systems? Simply put, because
it works.
ment. Trouble is, too many security pros think they
can switch on Windows Server Update Services
What’s needed is a more reasoned approach to
(WSUS) and assume their patch management is
patch management. One that understands the is-
taken care of.
sues, recognizes the risks and applies a centralized,
comprehensive patch-management solution as the
If only it were that easy. But the truth is that non-
core of a complete defense-in-depth strategy.
Microsoft apps make up an ever-growing portion of
your application landscape. And every one of them
“Patching is the low-hanging fruit,” Henry says.
can contain vulnerabilities that remain unpatched and
“There is no better return on your network-security
therefore can be exploited in a cyber-attack. Consider:
dollar than patching.”
»» 95 percent of organizations have socialnetworking apps installed.
»» 66 percent of apps have known vulnerabilities.
»» 78 percent of Web 2.0 apps support
file transfer.
»» 28 percent of apps propagate malware.1
The problem isn’t that patches aren’t available—
though zero-day attacks are clearly a concern.
The issue is that in many organizations, the applications haven’t been identified, and the patches
haven’t been applied. And that leaves the door
wide open to cyber-criminals.
“Unpatched vulnerabilities remain a prime exploit
vector. If you look at the malware toolkits available,
the vast majority rely on exploits that are more than
a year old,” says Paul Henry, security and forensics
The Apps Accumulate
Our increasingly connected, mobile workforce relies on software to get the job done. And increasingly, that software comprises third-party, nonMicrosoft apps. Apps that lack a unified patch
mechanism. A few relevant facts:
»» Of the top 50 most common apps, 26 are from
Microsoft and 24 are from third-party vendors.
»» Non-Microsoft apps have four times more
vulnerabilities.
»» There was a 71 percent increase in
vulnerabilities in software typically found on
endpoint PCs in 2009.
»» In North America, Europe and Asia, the
average PC contains at least three vulnerable
apps at any given time. 2
analyst for Lumension.
1. Palo Alto Networks Application Survey 2009, 2010
2. Secunia Yearly Report, 2010
1
Patch Management: Picking the Low-Hanging Fruit
Report: Patched Vulnerabilities Remain Prime Exploitation
VULNERABILITY
DISCLOSED
PATCHED
1. Microsoft Internet Explorer RDS ActiveX
2006
2006
2. Office Web Components Active Script Execution
2002
2002
3. Microsoft Video Streaming (DirectShow) ActiveX Vulnerability
2007
2009
4. Real Player [ERPCt] Remote Code Execution
2007
2007
5. Adobe Acrobat and Adobe Reader CollectEmailInfo
2007
2008
6. Adobe Reader GetIcon JavaScript Method Buffer Overflow
2009
2009
7. Adobe Reader util.printf() JavaScript Func() Stack Overflow
2008
2008
8. Microsoft Internet Explorer Deleted Object Event Handling
2010
2010
9. Microsoft Access Snapshot Viewer ActiveX Control
2008
2008
10. Adobe Reader media.newPlayer
2009
2009
11. Microsoft Internet Explorer (IE) iepeers.dll
2010
2010
12. BaoFeng StormPlayer Buffer Overflow
2009
2009
13. JVM Buffer Overflow Vulnerabilities
2009
2009
14. Microsoft IE STYLE Object Invalid Pointer Reference
2009
2009
15. Java WebStart Arbitrary Command Line Injection
2010
2010
Source: M86 Security Labs
http://www.zdnet.com/blog/security/report-patched-vulnerabilities-remain-prime-expoitation-vector/8162?tag=n1.e539
The top 15 most-observed vulnerabilities involve software for which patches have long been available.
The problem isn’t that patches aren’t available for
about, by missing patches, deciding not to patch.
these apps. It’s that the patches aren’t applied. For
… Ninety-nine percent are exploited configurations
example, Secunia reports an average 4,364 com-
and unpatched machines that the simplest vulner-
mon vulnerabilities and exposures (CVE) per year.
ability scan would have found,” says Gartner secu-
For about half these advisories, a patch becomes
rity expert John Pescatore. 4
available on the day of disclosure. For the remaining half, a patch becomes available within 30 days.
Apps are often the gateway to organizational databases, which house personally identifiable infor-
But on average, large organizations take at least
mation and intellectual property. Cyber-criminals
twice as long to patch client-side application vul-
know that if they can get to the app, they can get
nerabilities as they do to patch operating system
to data that has value. And security measures typi-
vulnerabilities. As a result, “90 percent of attacks
cally focus on the periphery and the network, leav-
are exploiting vulnerabilities we already knew
ing apps and databases at risk.
3
3. SANS Institute Report, September 2009
4. Gartner Security and Risk Management Summit, June 2010
2
Patch Management: Picking the Low-Hanging Fruit
Security advisories corroborate this view. “Web ap-
Surgical Strikes
plications now reign supreme in both the number
While third-party apps proliferate, attackers are
of breaches and the amount of data compromised
getting better at exploiting them. Some more wor-
through this vector,” says the Verizon 2010 Data
risome statistics:
Breach Investigations Report.
»» 98 percent of organizations experienced at
In January 2011, 60 percent of known
vulnerabilities were converted by cyber-criminals into attacks, according to
Dark Reading.
least one malware or virus intrusion in 2010.
»» 62 percent experienced at least 50 malware
attempts per month.
»» 43 percent said they had seen a major
increase in malware attacks 5
Security professionals are increasingly aware of
these realities. “What concerns them most about
“As the number of vulnerabilities increases, we’re see-
reducing the endpoint risk are preventing applica-
ing the bad guys increasingly being able to take them
tions from being installed or executing on their end-
and convert them into reliable exploits,” Henry notes.
points, discovering what applications are residing
on the network and ensuring that vulnerable appli-
Security pros agree. The three most challenging is-
cations are patched,” according to a survey of se-
sues they face are zero-day attacks, SQL injections
curity pros by Ponemon Institute, an independent
and the exploitation of software vulnerabilities more
research organization.
than three months old, according to the Ponemon
survey. As a result of these threats, more than one-
“On average, 15 new vulnerabilities are discovered
third of respondents said their networks are not
every day, and that’s a very conservative number,”
more secure today than they were a year ago.
Henry points out. “Software vulnerabilities are a
fact of life, and they’re growing daily. Understand-
They also said the risks are shifting. Today, they’re
ing these risks is crucial in defining your ability to
not primarily concerned about their data centers,
address them effectively.”
operating systems or network infrastructures. Instead, they’re most worried about mobile employees working from remote locations, downloading
unfamiliar third-party apps, and increasing the
threat of destructive, hard-to-detect malware attacks. It’s no surprise, then, that 61 percent predict
the top security risk over the next 12 months will
be the mushrooming volume of malware incidents.
5. Ponemon Institute, State of Endpoint Risk, December 2010
3
Patch Management: Picking the Low-Hanging Fruit
What’s troubling, though, is that the vast majority of
sources for vulnerabilities, threats and
organizations are using a broad range of security
remediation information. Finally, scan all
tools. For example, 98 percent have AV in place.
assets on a regular basis for vulnerabilities,
Sixty percent have endpoint firewalls. And 57 per-
patches and configurations.
cent use intrusion detection. Yet they’re still fall-
»» Prioritize —Maintain an inventory of assets
ing victim to attacks—in large part because they
and a database of remediation information.
haven’t patched their vulnerable applications.
Prioritize the order of remediation in terms of
risk, compliance, audit and business value.
Defense-in-Depth
In the face of increasing vulnerabilities and more sophisticated and persistent threats, smart organizations are moving toward a holistic, “defense-in-depth”
approach to security. Defense-in-depth leverages
layers of configuration management, application control, device control and AV. But at the very core lies
patch management—your first line of defense.
Patch management isn’t about simply switching on
WSUS. WSUS is a fine tool for patching Windows,
and Microsoft is very good about communicating
vulnerabilities in its operating system.
WSUS is useless in patching third-party
and Web apps though. And those apps
need to become a sharper focus of security efforts.
Aberdeen Group recommends a four-step approach to patch management:
»» Assess —First, identify all assets, including
platforms, operating systems, applications
and network services. Then, monitor external
»» Remediate —Start by modeling, staging and
testing remediation before deployment. Next,
deploy either manual or automated remediation.
Last, train administrators and users on
vulnerability-management best practices.
»» Repeat —Scan to verify the success of your
last remediation. Report on it for audit and
compliance. And continue to assess, prioritize
and remediate on an ongoing basis.
Achieving such effective patch management calls for
a centralized, comprehensive solution. Yet many organizations have relied on a fragmented approach.
They’ve deployed tools that don’t centralize or consolidate the management of heterogeneous environments. As a result, they lack visibility into their security posture. They miss devices and blind spots, and
they suffer from inconsistent reporting. They also
wind up with high management overhead and costs.
Instead, patch and configuration analysis and delivery must extend across all platforms, operating
systems and applications. Application and operating-system patching have to be benchmarked and
consistently
enforced.
Standard
configurations
should be assessed and enforced. And network
4
Patch Management: Picking the Low-Hanging Fruit
endpoints have to be managed, because unman-
have processes that are expensive and require
aged endpoints are unknown and unprotected.
high management overhead. Without centralized
management and reporting across your platforms,
“The old approaches clearly haven’t worked,” Hen-
systems and applications, you can’t achieve cost-
ry explains. “We have disparate products, and we
effective security.”
»
Top Perks of Patching
An effective patch-management solution delivers business benefits across a broad range of areas:
»» Security —Patch management is at the core of a complete defense-in-depth approach to security.
Patching known vulnerabilities is the most cost-effective, straightforward way to improve your
security posture.
»» Visibility —Discovery and agent deployment for both physical and virtual environments means
you always know what’s connected to your network. Reporting delivers critical feedback regarding
performance, endpoint events, return on investment and security overall.
»» Performance —By eliminating blind spots in network maintenance and ensuring that offline
machines receive crucial updates and patches during maintenance windows, you can improve
system performance.
»» Productivity —A centralized solution reduces setup and maintenance of users and user groups. It
also eases administration through workflow-based navigation and an intuitive management console.
And it ensures a more efficient, consistent and secure process for applying agent policies.
»» Risk —Security breaches can expose your organization to civil lawsuits and monetary damages. It
can also involve penalties related to service-level agreements and disrupted partner relationships.
Effective patch management can go a long way toward mitigation such risks.
»» Cost —Effective patch management reduces the time and effort IT staff need for installations,
upgrades, uninstalls and patches across your environment. An extensible platform with a single
»
infrastructure ultimately reduces your total cost of ownership. Most important, it reduces time and
resources spent on remediating security breaches.
5
Patch Management: Picking the Low-Hanging Fruit
Solid Solution
What’s needed, then, is a centralized, comprehensive approach to application patching. To that end,
Lumension® Endpoint Management and Security Suite: Patch and Remediation provides automated vulnerability assessment and patch management. The software enables you to automatically detect risks, deploy
patches and protect your business information across a complex, highly distributed physical and virtual
environment. These activities are seamlessly integrated into a single management console for complete
visibility into your network.
Lumension® Patch and Remediation enables patching of Microsoft, third-party and custom apps, as well as
patching based on CVEs. It also offers a full range of additional features, including granular patch control,
flexible management control, discovery of new and unauthorized clients, up-to-date data assessments, network visibility, software uninstall and built-in reporting.
The solution even delivers a lower total cost of ownership than WSUS, according to Tolly Enterprises, an
independent test lab. Tolly found that Lumension can provide at least 60 percent savings compared with
WSUS over one year and over five years. On average, it can save an enterprise with 500 workstations nearly
Traditional Endpoint
Security
Emerging Endpoint
Security Stack
A nt i V i r u s
p
l
ic a
De
t
ro
Ap
Malware
As a Service
pl
ro l
3rd Party
Application Risk
Patch &
Configuration
Mgmt.
Ap
Consumerization
of IT
Zero Day
v i c e C o nt r o
l
on Co
i
t
a
lic
De
nt
Blacklisting
As The Core
Defense-NDepth
tion C on
v i c e C o nt r o
l
An effective defense-in-depth approach places patch and configuration management at the center and then surrounds it with layers of application control, device control and AV software.
6
Patch Management: Picking the Low-Hanging Fruit
$75,000 over one year and nearly $400,000 over five years. That cost advantage comes from the solution’s
“diverse application support, powerful operations tools, … software removal and extensive reporting capabilities,” Tolly reports.
Lumension® Patch and Remediation is a key enabler of a comprehensive defense-in-depth strategy in
which patch and configuration management are at the core, surrounded by effective layers of application
control, device control and antivirus measures.
Ultimately, effective patch management promises to strengthen your security posture, boost your system
performance, improve IT and user productivity, and reduce your IT risk—all in a cost-efficient manner.
“Patch management is not the Holy Grail. But it is an absolute core component of defense-in-depth for securing any environment,” Henry concludes. “The best way to mitigate the risk of a vulnerability is to patch
it. End of story.”
7
Patch Management: Picking the Low-Hanging Fruit
About Lumension Security, Inc.
Lumension Security, Inc., a global leader in operational endpoint management and security, develops, integrates and markets security software solutions that help businesses protect
their vital information and manage critical risk across network
and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success
by delivering a proven and award-winning solution portfolio that
includes Vulnerability Management, Endpoint Protection, Data
Protection, and Compliance and Risk Management offerings.
Lumension is known for providing world-class customer support
and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including
Florida, Texas, Luxembourg, the United Kingdom, Germany, Ireland, Spain, France, Australia, and Singapore. Lumension: IT
Secured. Success Optimized.™ More information can be found at
www.lumension.com.
Lumension, Lumension Patch and Remediation, Lumension
Vulnerability Management Solution, “IT Secured. Success
Optimized.”, and the Lumension logo are trademarks or
registered trademarks of Lumension Security, Inc. All other
trademarks are the property of their respective owners.
Global Headquarters
8660 East Hartford Drive, Suite 300
Scottsdale, AZ 85255 USA
phone: +1.888.725.7828
fax: +1.480.970.6323
www.lumension.com
Vulnerability Management | Endpoint Protection | Data Protection | Compliance and IT Risk Management
8