Chuck Leaver – What You Need To Know About Patch Validation

Written By Logan Gilbert And Presented By Chuck Leaver



A current report suggests almost 20,000 brand-new software application vulnerabilities were found in 2017 – an all time record. Think of that for a second. That’s an average of fifty five new vulnerabilities each day. That’s a large amount for any IT store to manage.

Now there’s good news and bad news. The bright side is that patches were offered for eighty six percent of those vulnerabilities on the day of disclosure. The problem is that many organizations continue to fight with patch validation, prioritization and application. And as IT tasks increasingly move to the cloud, vulnerability visibility tends to decrease – intensifying a currently difficult challenge.

Let’s take a better look at the best ways to handle cloud patch validating efficiently.

First, a Patch Management Primer

Patch management is the practice of upgrading software applications with code modifications that attend to vulnerabilities exploitable by cyber hackers. Even though it’s been around for decades, patch management remains a tough procedure for most IT companies.

Modern enterprises have complicated IT environments with several integration points in between company systems. That means it is challenging for software developers to account for all unexpected consequences, e.g., a condition that might close a port, disable critical infrastructure interaction, or even crash its host server.

And concentrating on the effective patching of known vulnerabilities is the undeniable ‘huge bang for the buck’ play. In 2017, Gartner reported ninety nine percent of exploits are based on vulnerabilities that have currently been understood to security and IT specialists for a minimum of one year.

Cloud Patching Fundamentals

The first secret to shutting down the right vulnerabilities in your cloud IT infrastructure is visibility. Without being able to see into your cloud systems and applications, you can’t really understand if both those systems and applications are patched where it is essential. The second key is patch validating. Simply firing off a patch is no assurance that it activated appropriately. It may, or may not, have released effectively.

How would you be sure of this?

The Ziften Approach

Ziften supplies the visibility and validation you need to guarantee your cloud IT environment is safe and secure from the vulnerabilities that matter:

– In-depth capture of found OS and application vulnerabilities

– Findings mapped to vulnerability insight references, e.g., OWASP, CIS, CVE, CWE, and OSVDB

– In-depth descriptions of the implications of findings, organization impacts, and dangers for each of the determined exposures

– Vulnerability prioritization based upon asset urgency and risk of attack

– Remediation recommendations to close determined shortages

– In-depth steps to follow while mitigating reported shortages

– Detection and mitigation of attacks that exploit unpatched systems with quarantine procedures

Far too often we find that the data from customer’s patching systems improperly report that vulnerabilities are undoubtedly patched. This creates complacency that is unacceptable for security operations and IT operations groups.