170 likes | 377 Views
Spanish Tivoli User Group Desktop Patch Management. Gary R. Hamilton ( hamil gar@uk.ibm.com ) GRT - E MEA. Cost of Downtime Remediation time Impact to data integrity Lost credibility. Negative publicity Legal issues Stolen intellectual property. Size of Company (# of computers).
E N D
Spanish Tivoli User GroupDesktop Patch Management Gary R. Hamilton (hamilgar@uk.ibm.com) GRT - EMEA
Cost of Downtime Remediation time Impact to data integrity Lost credibility Negative publicity Legal issues Stolen intellectual property Size of Company (# of computers) Percentage of computers (moderate - major impact) Dollar Impact US Dollars ($) 55.0% $ 2,400,000 100k – 500k 50k – 95k 41.6% $ 4,228,000 33.8% $ 3,458,741 10k – 50k 5k – 10k 39.0% $ 1,452,288 1k – 5k 30.6% $ 474,847 500 – 1,000 19.8% $ 84,207 100 – 500 11.1% $ 79,863 Why Patch Automation?Let me count the ways Source: http://www.ntbugtraq.com
Vulnerability Reported Worm/Virus Launch Security bulletin and Patch Release Patch Developed Patch reversed engineered Worm/Virus Code created Why Patch Automation?You are always behind the bad guys Security Patch Timeline Patch Exposure Timeline Increasing Probability of Attack Attack Critical Path for Remediation
The Importance Of Proactive Patch AutomationAnd YOU have to do testing ** Patch Management Process Introduction, January 2004 http://www.microsoft.com/technet/security/topics/patchmanagement/secmod193.mspx#EFAA
Microsoft Patch Severity Ratings * Free Guide to Security Updates, Jeffrey R. Jones http://www.microsoft.com/technet/security/secnews/articles/itproviewpoint051204.mspx ** Medium Business Solution for Patch Management Plan, January 2005 http://www.microsoft.com/technet/itsolutions/smbiz/mits/pm/mit_pm_2.mspx#ECAA
Customers need a Complete Patch Automation ProcessIn Twenty-four Hours? • Vulnerability Assessmentis concerned with auditing software in your production environment, evaluating potential security threats, vulnerabilities and non-compliances. Requires accurate inventory of IT Assets to assess exposures. • Patch identification & downloadmeans determining a reliable and timely source of information on software updates (e.g. Microsoft Software Update Service, Sun Solaris Patch Manager, IBM AIX Fix Delivery Centre, Linux Red Hat Network). • Patch testing & approvalmeans following a process to maintain strict control over what is being changed, which vulnerability the fix addresses, what services and applications are being impacted, rollback plans, and priority. Requires an approval process. • Prioritizationis necessary to decide how quickly a fix must be rolled out (is it critical for business? how wild is the threat?). Scheduling depends on the box role (server/desktop), on the need of reboot, on impact on network, provided services etc. • Change build is the actual installable unit (patch, or software package) we’ll use to roll out the fix. This activity depends on the size of the patch, on the deployment method, on the need of a reboot, etc.). • Change implementationis the actual deployment. It may depend on best practices such as network load analysis, end user notification, reboot planning according to Quality of Service requirements, (potentially disconnected) laptops management, etc. • Change reviewis the phase that allows for identification of improvements and fine tunings in the patch management process itself. 1. Vulnerability Assessment 2. Patch Identification and Download 3. Patch Testing and Approval 4. Change Prioritization and Scheduling 5. Change Build 6. Change Implementation 7. Change Review
Data Center Automation LPAR Physical Servers VMware Software Distribution and Management (Branch Office – Departmental) Servers Software Distribution and Management (Pervasive – Mobile Client) Clients Clients - Pervasive Tivoli Configuration Manager 4.2.3 Appropriate if TCM or Framework installed • Tivoli Configuration Manager 4.2.3 • 1st Half 2005 * * All dates subject to change
Tivoli Configuration Manager 4.2.3 Patch Automation • Utilizes existing TCMarchitecture, people skillsand software distributionmechanisms • Leverages MBSA scanner, mssecure.xml and QCHAIN • For this initial release • Requires additional Patch Server • TCM Activity Planner Scheduling Capability • International Support
Microsoft Windows Update Tivoli Patch Server Internet Automated Patch Management IBM Tivoli Configuration Manager 4.2.3 Provides Seamless and Automated Patch Management Tivoli Configuration Manager TCM calls the Patch Server to automate downloading and auditing of patch utilities from Microsoft 1. 1 TCM discovers latest patch status and the Patch Server automates patch download 2. 2 The Patch Server automates building TCM software package and activity plans 3. 3 Distributed Servers and Clients Data Center Servers Mobile Clients TCM administrator releases activity plan and monitors status with reports 4. 4 4 4