Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

For Effective Patch Management, Don’t Overlook Risk

Patch management has always been an evergreen topic for security practitioners. Each time poor patching is identified as the root cause of a breach, it triggers a new flood of opinions on the countless dos and don’ts of triaging common vulnerabilities and exposures (CVEs), understanding criticality scores, and deploying patches. Often left out of the conversation, however, is an especially crucial variable: risk.

Patch management has always been an evergreen topic for security practitioners. Each time poor patching is identified as the root cause of a breach, it triggers a new flood of opinions on the countless dos and don’ts of triaging common vulnerabilities and exposures (CVEs), understanding criticality scores, and deploying patches. Often left out of the conversation, however, is an especially crucial variable: risk.

Specifically, I’m referring to the business risk that a vulnerability poses to a company. Evaluating business risk in this context requires insight into 1) the likelihood that a vulnerability will be exploited and 2) if exploited, how that vulnerability could impact the company on a macro level. Business risk intelligence (BRI) can provide these insights, which, once obtained, can enable a company to make informed decisions about if, when, and how to patch a vulnerability. 

But for many companies, the decision-making process with regard to patch management is not driven by business risk—it’s driven by CVE criticality scores that are often incorrectly equated with business risk. While such scores provide useful information about the nature of a vulnerability, they’re assigned by third-parties that are removed from the unique context of an organization’s security posture and, as a result, are not wholly indicative of risk. Companies that rely on CVE criticality scores in place of business risk are more likely to patch all vulnerabilities blindly regardless of the cost and need of doing so. 

To illustrate this concept, let’s examine the following scenario: 

While riding the train home from work one Friday, a CIO reads an article about a new vulnerability that has been deemed critical. She sends the article to the CISO, asking, “Have you seen this?” The CISO then sends it to the CTI team, also asking, “Have you seen this?” 

In response, the CTI team quickly researches the vulnerability and reports back to the CISO, “Yes, there is an exploit in the wild, but a patch was made available this afternoon.” Although it’s now getting late on a Friday night, the CISO commands the patch management team to deploy the patch immediately. By 1:00 AM on Saturday, the patch has been deployed.

The outcome of this scenario is what many security practitioners would agree is a win. After all, the vulnerability was removed and the company’s risk mitigated. But since we never evaluated the company’s risk in the first place, it’s impossible for us to determine whether this win was worth the cost of deploying the patch—not to mention the patch management team’s displeasure with having to work overtime on a Friday night.

Now imagine that the CIO had instead initially asked, “What is our risk related to this?”

Advertisement. Scroll to continue reading.

With this frame of reference, the CTI team researches the vulnerability, overlays this research with relevant insights gleaned from BRI, and reports to the patch management team, “There is an exploit in the wild, but it is highly unlikely that our company would be targeted.” 

The patch management team combines the CTI team’s research and BRI insights with information about the company’s critical assets and the estimated cost of deploying the patch to quantify the company’s risk. Rather than blindly deploying the patch, the team determines that the vulnerability in question applies to only 10 devices and that the cost to patch it would be approximately $25,000.

Together, the CTI and patch management teams then report to the CISO, “Yes, there is a known exploit, but it is unlikely to target our company. If we did face the exploit, the impact would be minimal. Deploying the patch will cost an estimated $25,000.”

Now armed with concrete information tied to both business risk and cost, the CISO makes an informed decision, responding to the CIO, “The vulnerability is present on a small number of devices. The risk is minimal but the cost to deploy the patch is high, so we have chosen to accept the risk.”

The above example highlights one scenario, but this approach to decision-making becomes even more powerful in situations pertaining to a series of CVEs and patches. When you understand the mitigation costs, potential impacts, and their likelihoods— in other words, your company’s business risk —you can identify and address what’s actually critical to your company regardless of the criticality score assigned by a third-party and ensure resources are being prioritized cost-effectively on efforts that have the greatest impact. 

Related ReadingCyber Risk Prioritization: Fixing What Really Matters

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Google spinoff SandboxAQ has hired Chris Bates as its first CISO.

HackerOne CEO Marten Mickos announced that he will be retiring from the company after nine years.

Lou Serlenga has joined Bitsight as Chief Revenue Officer (CRO), following leadership roles at Tenable, Nile, and HPE.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.