Containers Expo Blog Authors: Pat Romanski, Yeshim Deniz, Elizabeth White, Liz McMillan, Ravi Rajamiyer

Related Topics: Containers Expo Blog

Containers Expo Blog: Article

Compliance & the Role of Security Patch & Vulnerability Management

Differentiating between higher-risk systems and higher risk vulnerabilities

IT security professionals who are already managing the bottom-line expectations of their boardrooms while guarding their organizations against myriad security threats have a new "C-level" challenge - that of compliance. These professionals must now meet voluntary and mandatory regulations such as Sarbanes-Oxley, the Gramm-Leach-Bliley Act, the Federal Information Security Management Act (FISMA), and the Health Insurance Portability and Accountability Act (HIPPA).

A critical piece of the compliancy puzzle and an instrumental component already supporting the enterprise IT security posture, patch and vulnerability management is quickly becoming a multi-faceted solution that IT security professionals are employing to address this challenge.

However, determining the exact role of automated patch and vulnerability management and policy and how it supports and meets voluntary and regulatory compliance has become the question. Here we offer an answer to help the security professional understand the role of patch and vulnerability management in supporting auditable compliance - the state of compliancy at which an organization's IT control and security status and reporting ultimately meet the requirements of many of today's corporate policies and regulatory acts. Moreover, it's important to know that as a security professional the ability to achieve a state of auditable compliance is real and attainable.

The Dual Dilemma: Security and Compliancy
IT departments need to secure their infrastructure against threats such as viruses and worms and manage their network's availability. They also must demonstrate to auditors the adequacy of this security through measurement and process. The roadmap to regulatory compliance (see Figure 1) shows how the three technical competencies of an enterprise IT security program - command and control, threat mitigation, and audit and monitoring - strongly support the business goals of management, security and availability.

According to Yankee Group analyst Phoebe Waterfield, "management" is the Achilles' heel of many organizations and is central to demonstrating regulatory compliance. For example, she says, keeping up with critical patches for desktops, servers, and applications demonstrates effective management of IT systems and controls. Moreover, there's an urgent need for more effective processes to ensure that critical patches and fixes are applied to higher-risk systems in a timely manner. To this end, many organizations are now turning to strategic security solutions like patch and vulnerability management to improve systems security management processes and meet the burden of proof regulations impose.

Systems Management Under Security Scrutiny
The most frequent question organizations ask about regulations is how to interpret them and apply real-world security solutions to meet compliance. Regulations don't stipulate any specific security tools or products. Instead, they ask each organization to demonstrate how they are protecting the information contained in IT systems to a level commensurate with its value. For example:

  • Applying adequate security protections for customer data according to stated corporate security and privacy policies
  • Following best practices to secure a network's perimeter and access to systems on the network
  • Protecting confidential information and limiting access to personally identifiable information
The lack of specificity in regulations creates uncertainty about what compliance means, what auditors are looking for, and what vulnerabilities are considered unacceptable risks. IT departments can judge their general compliance readiness using the roadmap depicted in Figure 1. More than likely, some of these areas lack definition in most organizations.

The most common missing component is security management. This is a serious issue because it prevents IT personnel from demonstrating and reporting the effectiveness of the security components already in place. For example, a business may have a systems management tool such as Microsoft's SMS and use it for keeping endpoints such as workstations, laptops, and servers updated with the latest patches. However, this tool doesn't provide the necessary reports that give an accurate and timely picture of which systems are missing patches. It's no longer enough for organizations to patch; they must now prove that systems are patched to a reasonable level and measure how effective patching processes are at reducing vulnerabilities on their network. Figure 2 shows how manual or less than best-of-breed patch management processes leave systems exposed for long periods of time.

Malicious code threats propagate in days, not weeks. For example, according to Yankee Group research, the Nimda and Slammer worms spread worldwide in less than an hour, but the signature updates to protect networks weren't available for 24 hours. Then enterprises had to get these updates out on their networks to be protected. The impact and cost of virus and worm infections are largely attributed to unpatched and misconfigured systems running a vulnerable service. According to Gartner, over 90% of security exploits are carried out through vulnerabilities for which there are known patches.

Regulations Demand IT Control and Command
Regulations require organizations to demonstrate compliance through risk management and sufficient IT controls. Regulations don't always cite specific controls, so provided below are descriptions of how auditors are interpreting the law and some emerging standards that are used for industry benchmarking.

Sarbanes-Oxley Act
The Sarbanes-Oxley Act (SOX) is the single most important piece of legislation affecting public corporations since the U.S. securities laws of the early 1930s. The act charges managers of public companies with the task of certifying that they have an operational system of internal controls over financial reporting. SOX followed in the wake of several major accounting scandals and raised heads because it holds corporate executives directly responsible for the accuracy of the financial statements their companies make to the Securities and Exchange Commission (SEC). Section 404 of Sarbanes-Oxley deals with IT systems. It requires an annual evaluation of the internal controls protecting the systems used to prepare a company's financial statements. Companies must vouch for the veracity of their financial data and, significantly, the effectiveness of these internal security controls. Sarbanes-Oxley was supposed to come into effect in November 2004. However, the SEC recently pushed this deadline back a year, a relief to many publicly traded U.S. companies that now must make significant changes in their infrastructures to meet SOX IT control requirements.

The Federal Information Security Management Act (FISMA)
The Federal Information Security Management Act, enacted in December 2002, requires that federal agencies ensure the effectiveness of the information security controls protecting federal operations and assets. FISMA specifies what agencies must do to strengthen security. It's an agency-wide information security policy specifying how to classify data as confidential and how to protect data and systems according to their criticality. It mandates a set of internal audit activities, including periodic testing of IT security controls and submitting an annual report on FISMA compliance to the National Institute of Standards and Technology (NIST). Federal agencies are specifically required to report how they ensure all systems are patched in a timely manner.

More Stories By Sean Moshir

Sean Moshir is chairman and chief executive officer of PatchLink Corporation, a company he founded in 1991. During the course of his career, Sean has focused exclusively on strategic security software and services that supports business continuity with an emphasis on patch, vulnerability, and compliance (PVC) management functionality and support.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

IoT & Smart Cities Stories
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and G...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
DXWorldEXPO LLC announced today that "IoT Now" was named media sponsor of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...