Friday, March 31, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Improving compliance with faster patch management

Improving compliance with faster patch management

Outdated server software leaves critical systems vulnerable to exploits, but automated patch management prevents compliance issues and secures your servers.


Aleksandra Mitroshkina Aleksandra Mitroshkina
October 2, 2020
5 min read
Improving compliance with faster patch management

Volume and severity of cyber-attacks have increased in the last few years, but a recent report from Ponemon indicates that businesses still maintain their server status quo in terms of software patching and update frequency. Delays in patching, especially public-facing critical servers, leave them out of compliance and vulnerable to the latest exploits.

With current patching strategies, attackers outpace patching frequency and exploit vulnerable servers before administrators can deploy updates. Once an exploit is released, it only takes a matter of minutes for an attacker to scan for vulnerabilities, exploit them, and exfiltrate data, which happens too frequently for current patching strategies to remain effective.

Table of Contents

  • Increase in patching delays and data breaches
  • Patching costs and best practices
  • Integrating live patching with automation best practices
  • How does live patching technology work?
  • Conclusion

Increase in patching delays and data breaches

Machine learning (ML) and artificial intelligence (AI) aren’t just tools for the good guys. Cyber-criminals also incorporate ML and AI into their own solutions, which makes it more difficult for organizations to stay ahead of the latest vulnerabilities if they don’t have the latest counter defense. According to the latest Ponemon report, 77% of organizations say that they don’t have the resources to keep up with the latest patches before exploits are developed.

In addition to resource limitations, 74% of organizations claim that taking critical systems offline is a primary issue. It’s not only inconvenient but rebooting critical systems is a risk that costs organizations money. There is no guarantee that the system will reboot without any issues, and the longer the system is down, the longer it costs the organization money in downtime. This issue alone is why many administrators choose to delay patching until a reboot can be scheduled and users are aware of the downtime.

The most notable of data breaches due to unpatched software is the 2017 Equifax breach that affected 150 million US, UK, and Canadian consumers. Equifax’s public-facing servers went unpatched for months before being exploited. The cause of the breach was vulnerability CVE-2017-5638, which affected Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1. Apache released the security patch in March 2017, but Equifax’s servers had still not been patched in July 2017 when attackers were able to first breach the Equifax system. Equifax monitoring services detected suspicious traffic, but the servers were not taken offline until it was too late and millions of records were stolen.

The WannaCry global ransomware attack exploited unpatched Microsoft machines. WannaCry attackers were able to gain remote code execution on Microsoft machines running Server Message Block 1.0 (SMBv1). Security vulnerability CVE-2017-0143 was published in March 2017 with a software patch, but many global systems were still unpatched in May 2017 when WannaCry was initially deployed. WannaCry rapidly infected hundreds of thousands of machines and caused a global economic loss of $4 billion.

Patching costs and best practices

In the past 5 years, reported vulnerabilities more than doubled from approximately 6500 in the previous few years to over 12,000 in 2019. Because these vulnerabilities are public, it’s critical for compliance and data protection for organizations to patch software as soon as possible. The issue is that installing anything on a production server takes more than a simple command. Administrators must ensure that the patch does not affect the reliability of the system, and downtime should be kept to a minimum.

AT&T and the US Department of Homeland Security published advice for server administrators and several patch management best practices that should be followed. To summarize their advice, organizations should:

  • Audit and inventory all digital assets. This step will give administrators an overall outlook on the network’s attack surface and possible risks.
  • Assign risk to assets. A risk value will help with patching prioritization.
  • Monitor vendors and CVE reports. Vulnerability scanners will find unpatched systems, but administrators should also review the latest reports to find false negatives.
  • Test patches in a staging environment. Testing will prevent downtime and reboot failures provided the staging environment is a mirror of production.
  • Vulnerabilities with published exploit code should be given priority. Exploit code gives attackers an immediate method to exploit the unpatched system, so the longer a system is unpatched the more likely it will be compromised.
  • Use automation to significantly reduce patch time. Automated patching reduces the patching timeframe from months to an average of 48 hours to one week.

Integrating live patching with automation best practices

Automated patch management solves many of the deployment delays seen in the enterprise, but it still does not solve the problem of reboot risks and downtime. Large organizations with hundreds of servers need a solution that doesn’t require much human intervention. Live patching offers a solution to the reboot problem and offers a rebootless patching workflow to avoid downtime.

For many large organizations, rebooting critical servers is out of the question and isn’t an option. Imagine a financial organization such as Visa or Mastercard experiencing downtime due to server reboots. It’s inconceivable that customers cannot use their credit cards due to server reboots. Live patching solves this problem leaving Linux servers up for years without a reboot.

In a use case study, Affinity Water — the largest water supply company in the UK supporting 3.6 million people — uses live patching for their vast network of Linux systems running Red Hat, Oracle, and Ubuntu. Their patching schedule involved a long email trail, documentation, and coordinated efforts across departments. This resulted in long patching delays and left critical billing and consumer servers out of compliance and vulnerable. Now with live patching, Affinity Water no longer schedules reboots, keeps Linux servers patched with the latest updates, and reduced overnight and weekend work for employees.

How does live patching technology work?

In most patching environments, a vulnerability scan finds unpatched servers, the patch manager deploys the patches, and the server reboots if necessary. Live patching software can be deployed using patch management software such as Ansible, Puppet, SaltStack, Chef, or Spacewalk and take over for kernel updates. 

After deployment to servers, live patching modules check for updates at a central distribution server. When a patch is found, the live patching agent:

  1. Allocates kernel memory and loads new secure code into it.
  2. Momentarily freezes all processes in safe mode.
  3. Modifies original functions and jumps to the new secure code, ensuring old vulnerable code does not execute.
  4. Unfreezes all processes and resumes system execution.

Conclusion

The longer organizations leave their servers unpatched and out of compliance, the higher the risk of compromise and a data breach. Automated patch management solves the problem of outdated and unpatched software, but it still requires downtime from a reboot. Live patching gives organizations the best of both worlds — rebootless patching with patch management automation. Not only does this save time and administrative overhead, but it can save an organization millions in data breach legal fees, customer reparations, brand damage, and compliance violations.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Artificial IntelligenceCyber AttackRansomwareVulnerabilityWannaCry
Aleksandra Mitroshkina

Aleksandra Mitroshkina

Product Marketing Manager of KernelCare with 8 years experience in Advertising, Marketing and Project management for IT, mHealth and FinTech areas.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Sectigo announces the integration of WHMCS

Sectigo announces the integration of WHMCS

Related News

IP leasing should become a market standard

IP leasing should become a market standard

March 28, 2023 1:10 am
7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • IBM Cloud Direct Link now available on Cologix Access Marketplace
  • WordPress 6.2 “Dolphy” is now available
  • Vega Cloud guarantees minimum 10% savings on monthly cloud spend
  • [Event] Grab your DeveloperWeek Europe 2023 ticket free
  • How to get Linux ready for gaming

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.