-
Patch Management
-
Key Terms: Patch & Hotfix
-
Patch:
- A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
- This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes or bug fixes, and improving the usability or performance.
-
Hotfix:
- Originally defined as a patch to an individual OS or application to fix a single problem, installed live while the system was up and running, and without a reboot necessary. However, this term has changed over time and varies from vendor to vendor.
-
Patch Management:
- The planning, testing, implementing, and auditing of patches.
-
The patch management process consists of four phases:
-
Planning:
- Deciding whether a patch is necessary, and whether it is compatible with the organization's technology. If so, a plan should be created to test and implement the patch.
- Microsoft Baseline Security Analyzer (MBSA) can let you know if a patch is necessary.
-
Testing:
- Before deploying a patch, test it in a planned environment.
-
Implementing:
- If the test is successful, the patch is deployed to the necessary systems.
-
Auditing:
- Periodically, a sample of the systems are audited. This ensures no negative effects to the system have been caused by the patch.
-
Principle of Least Functionality
- When an organization configures computers and other information systems to provide only the essential functions.
- Using this method, a security administrator will restrict applications, services, ports, and protocols.
-
These official frameworks describe the concept of least functionality:
-
NIST CM-7:
- https://nvd.nist.gov/800-53/Rev4/control/CM-7
-
US DoD Instruction 8551.01:
- http://www.dtic.mil/whs/directives/corres/pdf/855101p.pdf
-
Disabling Unnecessary Ports and Services
-
Disable Unnecessary Hardware:
- Disable optical drives.
- Disable USB ports.
- Configure the virtual BIOS boot priority for hard drive first.
-
These types of programs should be removed to protect your organization:
- Instant Messaging Programs
-
Remote Procedure Call (RPC) and Remote Desktop Connection Programs
- Note: Port 3389
- Previous versions of programs that have been updated to new versions
- Applications that require notifications and Internet connectivity, which run behind the scenes and compete for processor and RAM resources
-
Trusted Operating System (TOS)
- To be considered secure, operating systems should have support for multilevel security, and be able to meet government requirements. An operating system that meets these criteria is known as a Trusted Operating System (TOS).
- Examples of certified Trusted Operating Systems include Windows 7, OS X 10.6, FreeBSD (with the TrustedBSD extensions), and Red Hat Enterprise Server.
- To be considered a TOS, the manufacturer of the system must have strong policies concerning updates and patching.
-
Application Whitelisting and Blacklisting
-
Application Blacklisting
- A basic access control mechanism that allows through all elements except those explicitly mentioned. Those items on the list are denied access.
-
Common items placed on an application blacklist may include:
-
Email Addresses (Anti-Spam Filters)
- Most email providers have a anti-spam feature that essentially blacklists certain email addresses if they are deemed unwanted.
-
Usernames and Passwords (System or Website Blacklists)
- Systems or websites blacklist certain reserved usernames that may not be chosen by the user populations. These reserved usernames are commonly associated with built-in system administration functions.
- Password blacklists are applied to prevent users from choosing passwords that are easily guessed or are well known and could lead to unauthorized access by malicious parties.
-
URLs, IP Addresses, and Domain Names (Web Browser or DNS Blacklists)
- The goal of a blacklist in a web browser is to prevent the user from visiting a malicious or deceitful web page via filtering locally.
- A common web browsing blacklist is Google's Safe Browsing, which is installed by default in Firefox, Safari, and Chrome.
-
Application Whitelisting
- The practice of identifying entities that are provided a particular privilege, service, mobility, access or recognition. Entities on the list will be accepted, approved and/or recognized. All other entities are denied.
-
Common Use Cases:
- Data Loss Prevention Systems
- Email Clients
- Web Content Filters
-
Applications with features that may leak data in unwanted ways:
- GPS
- Camera
- OAuth Federated Authentication
- Social Media Links
-
Disable Default Accounts and Passwords
- Networking devices are initially installed with a default set of user credentials. This default account should be changed to a new name, because attackers are aware of default account names.
- By renaming the default account, or by removing it altogether, you add a layer of security that makes it more difficult for an attacker to figure out which account has administrative access to the device.
- If any guest accounts exist, it is recommended that you disable these accounts.
- More important than the account name or the username is the password. If you have to use a guest account, set a complex password.