White Paper Protect Critical Assets with Virtual Patching Closing the vulnerability window using predictive threat protection White Paper Table of Contents Vulnerabilities Lead to Risk Exposure and Downtime.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Out-of-band patching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Change Management Approaches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reactive change management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Proactive change management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Virtual patching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 The McAfee Virtual Patching Solution: Layered Security Risk Management. . . . . . . . . . . . . . . . . . . . . . . . . . 5 McAfee Network Security Platform. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 McAfee Vulnerability Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 McAfee ePolicy Orchestrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 McAfee Enterprise Security Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Deployment options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Improved protection through McAfee Global Threat Intelligence (McAfee GTI) . . . . . . . . . . . . . . . . . . . 7 Virtual Patching (A Step-by-Step Guide) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Step 1: Deploy McAfee Network Security Platform. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Step 2: Scan your entire network for vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Step 3: Assess your organization’s risk posture based on vulnerability scans and deployed countermeasures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Step 4: Enable additional vulnerability protections in McAfee Security Platform. . . . . . . . . . . . . . . . . 9 Trust Intel Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Protect Critical Assets with Virtual Patching 2 White Paper IT organizations have grown accustomed to underfunded budgets, low staffing levels, and lack of IT security expertise. Unfortunately, they have also grown accustomed to unpatched vulnerabilities, compromised security, and the higher risks and costs that result. Virtual patching using predictive threat coverage, automated vulnerability scanning, and risk visualization is a scalable and cost-effective approach to protecting critical assets. It enhances your patch and change-management processes while significantly reducing security administration costs. Vulnerabilities Lead to Risk Exposure and Downtime. As long as there is software, there will be software vulnerabilities. Each year, IT organizations face thousands of common vulnerabilities and exposures (CVEs) across hundreds of servers and thousands of clients. Microsoft alone announced 488 CVEs in 2014, of which 391 (80%) were classified as highest severity. Wherever you find vulnerabilities occurring at this scale, you will also find malware and criminal exploits. Cybercriminals are introducing new spyware, viruses, Trojans, worms, and other malware at alarming rates. The total number of malware samples in the McAfee Labs zoo grew by 17% in Q4 2014, with more than six new threats appearing every second. While both vulnerabilities and malware are increasing, most IT organizations face ever-tightening IT budgets and limited staffing to combat these cybercrimes. Patching is a critical part of fighting malware and data theft, but it is also time-consuming, costly, and unpredictable. Vulnerability announcements and patch releases arrive constantly, creating inevitable gaps between unscheduled revelations and scheduled patch processes. When the interval from discovery to patch deployment lengthens, a window of opportunity opens with a panoramic exposure to risk, exploitation, and loss. The roll call of organizations that have paid the high price of delayed patch distribution grows longer every month, with new victims from every industry sector: retail, healthcare, financial services, entertainment, and government. Out-of-band patching To address critical vulnerabilities, IT organizations must frequently deploy patches out of band. This is disruptive and carries its own risks, including unplanned downtime, service interruptions, lost productivity, overtime expense, and even system crashes due to insufficient testing. The operational costs and revenue loss can hit the organization’s bottom line hard. For example, the Conficker worm alone had an economic impact of $9.1 billion according to ZDNet.1 Neither the risks of unpatched systems nor the high costs of frequent, unscheduled patching operations are acceptable. IT organizations need a more efficient way to manage vulnerability-driven change. Protect Critical Assets with Virtual Patching 3 White Paper How to Deal with the “Culture of No” in Patching Practice Gartner analysts Andrew Lerner and Jeremy D’Hoinne describe a dozen widespread worst practices that often reduce network availability, increase risks and costs, and alienate end users. Number two in their dirty dozen is something they call the “culture of no.” It’s an elitist, dictatorial approach to security implementation and enforcement that ignores legitimate business needs. As an example, the authors cite patch processes that force immediate system reboots with no option for users to defer or postpone the interruption of their work. Too often, this results in a subculture of security bypass that increases the organization’s overall risk.2 Change Management Approaches The available approaches to managing change in vulnerable systems fall into three categories: reactive, proactive, and virtual. Reactive change management Reactive change management is essentially the failure to plan for change and impose order on the change process. Patches are tested and applied whenever vendors release them. Some call it “the patching fire drill.” Companies that operate this way waste considerable time, effort, and money—and they leave themselves open to attack. They have no concept of out-of-band patching, as nothing ever seems to be patched according to a regular cycle. They also have no comprehensive way to prioritize patches, relying almost exclusively on operating system (OS) and application vendors’ patch releases to dictate patch schedules. As a result, critical CVEs are given immediate priority, as the IT department has little or no visibility into its actual vulnerabilities or the threats that target its network. Proactive change management In contrast to the reactive, after-the-fact fire drill way of patching, proactive change management puts processes in place ahead of time and sticks to a predictive patch cycle based on typical vendor patch release schedules. Organizations in this category typically schedule patch deployment when it’s most beneficial for the business (after hours or on weekends, when critical system use and network traffic are typically low). Client systems are often patched on a weekly or bi-weekly basis, application servers on a monthly basis, and critical database infrastructure on a quarterly basis. Even with proactive change management, these organizations rarely have a consolidated view into the number and severity of system vulnerabilities, and any connection between network vulnerabilities and looming threats is the result of manual correlation efforts. Organizations with proactive change management processes are still exposed to the risks and operational perils of out-of-band patching, and typically don’t have the means to increase scheduled patching intervals. Virtual patching The third way to handle change management is virtual patching—a complement to proactive change management. Virtual patching uses proven security technologies to protect you from emerging threats until you can actually patch the targeted vulnerabilities through normal processes. It reduces the “fire drill” mentality of patch management, streamlining operations and reducing costs. Virtual patching is particularly useful in reducing the need for frequent, out-ofband patch cycles. Technologies that help assist virtual patching include the following: ■■ ■■ ■■ ■■ Vulnerability scanning that discovers vulnerabilities on every device, application, operating system, IP address, and URL associated with your network. Risk assessment tools that combine threat, vulnerability, and countermeasure information to pinpoint assets that are truly at risk and prioritize security activities. Network intrusion prevention systems (IPSs) that monitor network traffic and block malicious activity. Enterprise security consoles that cull all the data from the above systems to provide a real-time view of network security and allow integrated operation of these interrelated systems from one centralized point. Protect Critical Assets with Virtual Patching 4 White Paper Efficiency Reactive Change Management Proactive Change Management Virtual Patching + Proactive Change Management Inefficient; lots of wasted effort More efficient Highly efficient On-cycle patching Not practiced Yes Yes Out-of-band patching N/A Required for critical updates Eliminated, reducing costs Quantifiable risk exposure No No Yes Effect on risk posture Limited Better, but companies still face enormous risk Best, risk is greatly reduced Window of exposure to critical vulnerabilities Wide open Days or even weeks Hours Overall risk mitigation strategy Keep fingers crossed Actively try to safeguard IT infrastructure Close vulnerability window by employing multilayer security and systematic patching Table 1. Implications of the three change-management methods. The McAfee Virtual Patching Solution: Layered Security Risk Management Virtual patching is more than a temporary fix; it’s a fundamentally sound approach to ensuring security by enhancing your patch and change-management processes while reducing system exposure. The virtual patching solution from McAfee, a part of Intel Security, provides a layered approach to security risk management while adding the ability to apply a virtual patching strategy to your existing change-management process. It combines proven defenses and security insight with realtime threat intelligence to help close the vulnerability window until patching can occur through your regular change-management processes. McAfee virtual patching integrates McAfee® Network Security Platform, McAfee Vulnerability Manager, and McAfee Enterprise Security Manager to provide comprehensive risk assessment and rapid remediation for vulnerable systems. McAfee Network Security Platform McAfee Network Security Platform provides integrated network and systems security, including industry-leading intrusion detection and prevention. Its predictive security engine combines anomaly detection and cloud-based threat intelligence with more traditional signature-based defenses that allow you to prevent attacks on vulnerable systems. McAfee Network Security Platform not only detects suspicious network intrusions, it also blocks malicious attacks before they can inflict harm through the use of vulnerability-based signatures and real-time threat information with McAfee Global Threat Intelligence. To further facilitate virtual patching, McAfee Network Security Platform allows you to quarantine suspect or vulnerable systems, protecting other network resources until patches can be created, tested, and deployed during your regular patch cycle. McAfee Vulnerability Manager McAfee Vulnerability Manager scans all your network assets for vulnerabilities and identifies risk exposures and policy violations. By prioritizing vulnerabilities, McAfee Vulnerability Manager improves IT efficiency, providing an attractive ROI while accelerating critical patch deployment. Once vulnerabilities are identified, McAfee Vulnerability Manager helps you identify the most critical remediation and patching needs quickly and accurately. Through standards-based scoring, you can run targeted scans on critical assets and determine whether appropriate protection is in place. Protect Critical Assets with Virtual Patching 5 White Paper McAfee Global Threat Intelligence (McAfee GTI) McAfee GTI is based on: ■■ ■■ ■■ ■■ More than 100 million nodes deployed around the globe. 112 reputation servers in seven data centers. More than 100 billion queries each month from all threat vectors: file, web, message, and network. The most comprehensive set of threat intelligence services in the market—file reputation, web reputation, web categorization, message reputation, and network connection reputation. McAfee ePolicy Orchestrator The McAfee® ePolicy Orchestrator® (McAfee ePO™) platform is a centralized security management solution that unifies security policy and execution across endpoints, networks, data, and compliance solutions from McAfee and third-party software providers. It provides a dashboard view of the security environment with drill-down views that reveal granular details of threats and compliance issues as they relate to specific assets. It collects host information via multiple discovery techniques and provides automated system management and configuration control to streamline threat remediation. McAfee Enterprise Security Manager McAfee Enterprise Security Manager is a revolutionary security information and event management (SIEM) solution that delivers actionable insight into the security state of a network and all the systems, applications, networking components, and security controls that reside on it. McAfee Enterprise Security Manager collects and correlates billions of log events and flow data in a highly tuned database, keeping years of information available for ad hoc queries, forensic analysis, rules validation, and compliance reporting. Results are delivered in seconds or minutes, not hours, providing real-time situational awareness at the speed and scale necessary to detect critical events, direct intelligent response, and enable continuous compliance. Beginning with version 9.5, McAfee Enterprise Security Manager includes a new threat management module that incorporates much of the functionality previously developed within McAfee Risk Manager. This module serves as the nerve center of our virtual patching solution. When activated and configured, the threat management module collects vulnerability information (CVEs) from McAfee Vulnerability Manager (and many third-party vulnerability scanners), as well as real-time threat feeds from McAfee Global Threat Intelligence. It correlates open CVEs and emerging threats against inventories of current assets and available security countermeasures, which it acquires from McAfee ePO software. The module then calculates the risk posed by each threat and vulnerability, and prioritizes the available countermeasures for deployment. Figure 2. The threat management module in McAfee Enterprise Security Manager collects, correlates, prioritizes, and displays threat and vulnerability information.. Protect Critical Assets with Virtual Patching 6 White Paper Reducing Malware Risk for the City of Chicago The City of Chicago’s new Information Security Office (ISO) recently implemented an integrated set of Intel Security solutions, including McAfee Vulnerability Manager, to secure the city’s critical IT infrastructure. “With the improvements in patch management and validation provided by McAfee Vulnerability Manager, the tuning we’ve done to [McAfee] VirusScan® on the endpoints, and improvements to our scanning schedule, I can say that we’ve been able to reduce identified malware in our environment by more than 2,000%,” says Chief Information Security Officer Arlen McMillan. “With McAfee Vulnerability Manager checking that patches were deployed effectively, in addition to the ad hoc and pinpointed vulnerability checks it performs against critical systems, we’ve been able to reduce malware incidents from tens of thousands to practically none.”3 Deployment options Deploying the complete virtual patching solution set provides the highest levels of visibility, value, automation, and protection. We recommend a complete solution deployment as a best practice. Some customers, however, may choose to build their virtual patching solution in incremental steps: ■■ ■■ ■■ McAfee Network Security Platform, with its award-winning intrusion protection system, provides essential baseline coverage for all vulnerable systems on a network segment Adding McAfee Vulnerability Manager improves your risk posture and operational efficiency by directing your patching and security efforts at those systems with the most risk Completing the solution with McAfee Enterprise Security Manager and McAfee ePO software technology takes the guesswork completely out of the equation, allowing you to identify exactly which systems need coverage and which defense mechanisms to put in place Improved protection through McAfee Global Threat Intelligence (McAfee GTI) In addition to signature-based defenses, McAfee Network Security Platform also includes realtime, reputation-based protection. McAfee GTI helps protect users against malware that is often downloaded by unsuspecting users when they visit compromised websites. With real-time protection through McAfee GTI, McAfee Network Security Platform protects your networks against more than 300 million malware samples. Simply turn on McAfee GTI in the McAfee Network Security Manager console to unlock the power of cloud-based security. McAfee GTI offers the industry’s most comprehensive, real-time protection against both known and emerging threats across all key threat vectors—file, web, email, and network. This cloud-based threat intelligence service spans the Internet, using millions of sensors to continually gather realworld threat information. McAfee GTI understands the reputation of a file, website, IP address, and sender over time and correlates this reputation-based information with advanced threat protection techniques for accurate, real-time insight of both known and emerging electronic threats. This superior threat intelligence is delivered via the complete suite of Intel Security products, effectively compressing customers’ protection gaps from days to seconds and often protecting them in a predictive manner. ■■ ■■ ■■ Comprehensive protection reduces incident probability, lowers costs associated with incident remediation, and ensures a better security posture. Real-time collection, analysis, and distribution of threat intelligence compress the protection window from days and hours to seconds and milliseconds, and, in many cases, provide predictive protection. Integration into our products reduces administration overhead while providing complete, consistent coverage. By delivering real-time threat insight and superior protection, McAfee GTI allows companies to adopt innovative patch management strategies such as virtual patching. Protect Critical Assets with Virtual Patching 7 White Paper Virtual Patching (A Step-by-Step Guide) The following process assumes all products in the previous scenario have been deployed. Step 1: Deploy McAfee Network Security Platform As stated earlier in this paper, virtual patching hinges on the intrusion prevention capabilities of the McAfee Network Security Platform. The first step is to strategically deploy network security to protect critical assets in relevant network segments. Start with network perimeters, data center edges, and between security enclaves and zones within the data center. This provides baseline coverage against attacks launched both from external sources as well as within the network. Additionally, McAfee Network Security Platform supports next-generation network architectures, including virtualization capabilities that provide flexibility to cover both physical and virtual network segments with unique policies. Step 2: Scan your entire network for vulnerabilities McAfee Vulnerability Manager installs on your physical or virtualized hardware and is also available as a hardened appliance. Delivering unrivaled scalability, McAfee Vulnerability Manager canvasses everything on your network—smartphones, printers, rogue devices, forgotten VMware hosts, and everything in between—including applications, operating systems, and version numbers. If it has an IP address, McAfee Vulnerability Manager can discover and scan it. For instance, on Patch Tuesdays, you can quickly decide which machines might be affected by a new Microsoft Windows or Adobe vulnerability. In minutes, without rescanning your entire network, McAfee Vulnerability Manager visualizes and ranks the risk potential of new threats based on existing configuration data and risk scores. In addition to standards-based scoring, patented McAfee Foundscore® risk assessment technology uses a unique algorithm to calculate risk. It takes into account asset criticality, risk rating for discovered vulnerabilities, resource type, and other variables to deliver a usable risk grading. You can then select assets based on criticality. Just right-click to run an instant targeted scan on each system. While the scans run, McAfee Vulnerability Manager shows you every system’s software configuration and confirms whether or not appropriate intrusion prevention is in place. Conclusive evidence—such as expected and actual scan results, any systems not scanned, and any failed scans—documents that specific systems are “not vulnerable,” which is an increasingly common audit requirement these days. Step 3: Assess your organization’s risk posture based on vulnerability scans and deployed countermeasures The threat management module in McAfee Enterprise Security Manager correlates threat feeds from McAfee GTI with your vulnerability and countermeasure information. By doing so, it delivers an immediate assessment of the assets that are at risk within your organization as well as recommended remediation and subsequent patching steps. You instantly get details about a threat, its severity, and the risk it presents, allowing you to prioritize your remediation efforts according to an asset’s value. McAfee Enterprise Security Manager also delivers a quantifiable risk score, allowing an organization to determine and chart the level of risk over time. It enables you to chart your vulnerability profile and pinpoint where to focus your security efforts. It displays “At risk” and “Not at risk” summaries, then allows you to drill into specific details. Once all vulnerabilities, threats, and countermeasures have been identified and prioritized, the McAfee ePO console can be used to push out any required .DAT or other files to out-of-date systems. Protect Critical Assets with Virtual Patching 8 White Paper Figure 3. The threat management module in McAfee Enterprise Security Manager shows you exactly which assets in your environment are most at risk. Step 4: Enable additional vulnerability protections in McAfee Security Platform Out of the box, McAfee Network Security Platform offers better protection levels than most vendors’ “tuned” protection levels. In fact, in an NSS Labs Data Center IPS report, McAfee Network Security Platform blocked 99.2% of threats using its out-of-the-box “Recommended” policy settings, and 99.6% of threat after minimal tuning.4 With the help of McAfee Vulnerability Manager and McAfee Enterprise Security Manager, organizations can easily and quickly identify any gaps in vulnerability coverage and recommend the appropriate countermeasures. For example, they can activate the appropriate vulnerability-based signatures to protect against the latest vulnerabilities and threats, and eliminate the risk exposure until IT can appropriately patch the systems during the next regularly scheduled patch cycle. By using McAfee Network Security Platform, organizations are typically covered within hours of (if not prior to) vulnerability announcements through predictive threat coverage and McAfee Labs rapid release of vulnerability signatures. To simplify this process, the threat management module in McAfee Enterprise Security Manager indicates which signatures are required to ensure protection and whether you have them in place. If you don’t have a required signature, you can always download it through the McAfee Network Security Platform console with a simple right-click function. Note, however, that deploying every conceivable signature can reduce network performance and result in false positives (blocking legitimate network traffic). That’s why it’s best practice to only deploy the optimal collection of signatures, which McAfee Enterprise Security Manager helps you identify. Protect Critical Assets with Virtual Patching 9 White Paper Trust Intel Security Intel Security provides a robust portfolio of security products that work together via seamless integrations. As such, it offers the industry’s most comprehensive security management platform, delivering proactive risk management, integration with business operations, and coordinated security defenses. When you deploy Intel Security solutions in your IT infrastructure, you gain: ■■ ■■ ■■ ■■ Situational awareness: Monitor, manage, and report on risk management metrics to reduce threat detection and response times, focus security efforts and investments, and reduce costs. Shared intelligence: Coordinate defenses across your security layers, so that endpoints, networks, email, web, and data layers all work together to minimize or eliminate security attacks. Global heterogeneous protection: Manage security of any device, data, network, application, or database across hosted, cloud, SaaS, and on-premises as well as virtual or physical environments. Open platform: Integrate security into existing business processes by tying systems and change management frameworks into a centralized security operation. Ready for More? For more information on how the Intel Security products in this paper can improve your change management process, see the following product pages: McAfee Network Security Platform: Control your vulnerability risk by locking down the perimeter. Visit www.mcafee.com/NSP. McAfee Vulnerability Manager: Get the visibility you need to find and prioritize endpoint vulnerability. Visit www.mcafee.com/VM. McAfee Enterprise Security Manager: Assess risk and threats across the organization with enterprise-wide correlation. Visit www.mcafee.com/ESM. About Intel Security McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security combines the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. Intel Security’s mission is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com. 1. Source: http://www.zdnet.com/article/confickers-estimated-economic-cost-9-1-billion/ 2. Source: Avoid these “Dirty Dozen” network security worst practices. http://www.gartner.com/technology/reprints.do?id=127EEZRI&ct=150113&st=sb 3. Source: http://www.mcafee.com/us/resources/case-studies/cs-city-of-chicago.pdf 4. http://www.mcafee.com/us/resources/reports/rp-nss-ips-svm-ns9300.pdf McAfee. Part of Intel Security. 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.intelsecurity.com Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright © 2014 McAfee, Inc. 61919wp_virtual-patching_0415
© Copyright 2026 Paperzz