288 pages | 14 B/W Illus.
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure. Until now, there were no technical books for companies to use as a starting point for deploying the process. Curing the Patch Management Headache responds to this demand by tying together all aspects of the subject into one easy-to-understand format that is applicable regardless of the operating system, network device, or patch deployment tool.
This volume provides CISOs, CIROs, and IT directors and managers with the support and guidance that they need to integrate an effective patch management process into their environments. It emphasizes the importance of patch management and explains why having organizational support for the process drives successful implementation. The book details how patches should be implemented on devices and systems within an infrastructure, and how to distribute them in a timely manner.
"Felicia has led the industry in addressing the problems patching systems represent, creating a comprehensive, process-oriented approach to gaining control over the security implications, as well as demonstrating a solution to managing the entire process… The framework Felicia is presenting herein can be applied to any size organization… It is my expectation that you will gain an enormous advantage from this book."
Jim Tiller, CISM, CISA, CISSP, Chief Security Officer and Managing Vice President of Security Services for International Network Services (INS), from the Foreword
How to Use This Book
Types of Patches
Product Vendors Responsibility
VULNERABILITY TO PATCH TO EXPLOIT
Who Exploits, When, Why and How
Tracking New Patch Releases
WHAT TO PATCH
NETWORK AND SYSTEMS MANAGEMENT: ITIL
Network and Systems Management
Starting with Process
Assessing and Implementing IT Operations
Preparing for Security Operations
Establishing Security Operations
Implementing Security Operations
What is Vulnerability Management?
Vulnerability Management Process
Establishing Vulnerability Management
Process versus Tools
Where to Use Them
How to Determine Which One is Best
Common Issues with Testing
The Testing Process
Patch Ratings and How They Affect Testing
Prioritizing the Test Process
The Test Lab
Wrapping It Up
PROCESS LIFE CYCLE
Roles and Responsibilities
Update Operational Environment
PUTTING THE PROCESS IN PLACE
Patch Management Policy