首页> 外文OA文献 >Limiting vulnerability exposure through effective patch management : threat mitigation through vulnerability remediation
【2h】

Limiting vulnerability exposure through effective patch management : threat mitigation through vulnerability remediation

机译:通过有效的补丁程序管理来限制漏洞的暴露:通过漏洞修复来缓解威胁

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

This document aims to provide a complete discussion on vulnerability and patch management.The first chapters look at the trends relating to vulnerabilities, exploits, attacks and patches.These trends describe the drivers of patch and vulnerability management and situate the discussion in the current security climate. The following chapters then aim to present both policy and technical solutions to the problem. The policies described lay out a comprehensive set of steps that can be followed by any organisation to implement their own patch management policy,including practical advice on integration with other policies, managing risk, identifying vulnerability,strategies for reducing downtime and generating metrics to measure progress. Having covered the steps that can be taken by users, a strategy describing how best a vendor should implement a related patch release policy is provided. An argument is made that current monthlypatch release schedules are inadequate to allow users to most effectively and timeously mitigate vulnerabilities. The final chapters discuss the technical aspect of automating parts of the policies described. In particular the concept of ’defense in depth’ is used to discuss additional strategies for ’buying time’ during the patch process. The document then goes on to conclude that in the face of increasing malicious activity and more complex patching, solid frameworks such as those provided in this document are required to ensure an organisation can fully manage the patching process. However, more research is required to fully understand vulnerabilities and exploits. In particular more attention must be paid to threats, as little work as been done to fully understand threat-agent capabilities and activities from a day to day basis.
机译:本文档旨在提供有关漏洞和补丁程序管理的完整讨论。第一章介绍与漏洞,漏洞利用,攻击和补丁程序有关的趋势,这些趋势描述了补丁程序和漏洞管理的驱动程序,并将讨论置于当前的安全环境中。接下来的章节旨在介绍该问题的政策和技术解决方案。所描述的策略列出了一套全面的步骤,任何组织都可以遵循这些步骤来实施自己的补丁程序管理策略,包括有关与其他策略集成,管理风险,确定漏洞,减少停机时间的策略以及生成度量进度的策略的实用建议。在介绍了用户可以采取的步骤之后,提供了一种策略,该策略描述了供应商应如何最好地实施相关的补丁程序发布策略。有人认为当前的每月补丁发布计划不足以允许用户最有效,最及时地缓解漏洞。最后几章讨论了自动化部分所述策略的技术方面。特别是,“深度防御”的概念用于讨论修补过程中“购买时间”的其他策略。然后,该文档继续得出结论,面对不断增加的恶意活动和更复杂的修补,需要使用本文档中提供的坚实框架来确保组织可以完全管理修补过程。但是,需要进行更多研究才能完全了解漏洞和利用。特别是,必须更加注意威胁,因为很少做任何工作来充分了解每天的威胁代理功能和活动。

著录项

  • 作者

    White Dominic StJohn Dolin;

  • 作者单位
  • 年度 2007
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号