CHAPTER 40
MANAGING SOFTWARE PATCHES AND VULNERABILITIES
Peter Mell and Karen Kent
40.2 MOTIVATION FOR USING AUTOMATED PATCHING SOLUTIONS
40.3 PATCH AND VULNERABILITY MANAGEMENT PROCESS
40.3.2 Creating a System Inventory
40.3.3 Monitoring for Vulnerabilities, Remediations, and Threats
40.3.4 Prioritizing Vulnerability Remediation
40.3.5 Creating an Organization-Specific Remediation Database
40.3.7 Deploying Vulnerability Remediations
40.3.8 Distributing Vulnerability and Remediation Information to Administrators
40.3.10 Vulnerability Remediation Training
40.4 PATCH AND VULNERABILITY MANAGEMENT ISSUES
40.4.1 Enterprise Patching Solutions
40.4.2 Reducing the Need to Patch through Smart Purchasing
40.4.3 Using Standardized Configurations
40.4.4 Patching after a Security Compromise
40.5 CONCLUSION AND SUMMARY OF MAJOR RECOMMENDATIONS
40.1 INTRODUCTION.
Vulnerabilities are flaws that can be exploited by a malicious entity to gain greater access or privileges than it is authorized to have on a computer system. Patches are additional pieces of code developed to address problems (commonly called “bugs”) in software. Patches enable additional functionality, or they address security flaws such as vulnerabilities within a program. Not all vulnerabilities have related patches, especially when new vulnerabilities are first announced, so system administrators ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.