On 2010 Jan 13, at 14:13, Richard Chycoski wrote:

> Weekly is far too frequent for most environments. Unless a very 
> particular threat has been exposed, this is overkill, and even getting 
> quarterly patching schedules can be difficult. Rebooting weekly is out 
> of the question on many of our servers. In some environments, rebooting 
> more than once per year takes very-senior-management approval!
> 
> Also, if you require proper testing and burn-in of patches in your 
> non-production environment first, (which is a very good idea if you want 
> to keep your systems stable), then you will spend all of your time 
> testing and installing patches, and always be several weeks behind 
> anyway - testing patches includes letting them run for at least a week, 
> and preferably a month, before confirming their efficacy and impact.
> 
> Even our 'exposed' machines are patched quarterly-or-less - they are 
> also configured to minimise external threats such that 
> security-bug-of-the-week is less likely to be exploitable on these 
> machines in the first place. Good security policies help minimise the 
> risk of OS security bugs, but occasionally a patch does have to be 
> rushed through to combat some known-deadly vulnerability

First I want to agree completely with the above.

The threat triage model is a necessary thing to do when looking at security 
issues.

Security patching isn't just applying every patch that claims to be security 
right away.  Analyze the threat and determine the risk of the exploit and the 
risk of the patching causing a problem.  Determine a deployment schedule.  As 
stated above, that deployment schedule needs to involve installing to each 
environment in proper sequence.  (We do development first, then test, then 
prod).  Low risk issues may simply be bundled into the regular, non-security 
patching bundle.

Sometimes (rarely) there will be a security alert that requires out of cycle 
patching.  That's what the triage model is for, to determine what issues those 
are and to have a process for emergency deployment in those cases.  I've seen a 
couple issues that were so critical that required us to not even take three 
days burn-in before deployment to production of some fix over the past ten 
years (Solaris and RHEL).  Rare, but they did happen.  Plan in advance for 
those cases.

When looking at security announcements, I look at factors such as local vs 
remote attack.  What is the damage?  DoS is a nuisance in most cases, but not 
as crucial generally as a arbitrary command execution.  A surprisingly large 
number of attacks require local access, which lowers the threat rating 
significantly.  They still need to be processed, but I have mitigating factors 
to limit exposure and to track who could have triggered the exploit.

The number of critical alerts I've seen has gone down over the years, while the 
number of relatively low priority issues has gone up.  

----
"The speed of communications is wondrous to behold. It is also true that
speed can multiply the distribution of information that we know to be
untrue." Edward R Murrow (1964)

Mark McCullough
mmc...@earthink.net 


_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to