{"id":20073,"date":"2022-09-12T16:10:56","date_gmt":"2022-09-13T00:10:56","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/09\/12\/news-13806\/"},"modified":"2022-09-12T16:10:56","modified_gmt":"2022-09-13T00:10:56","slug":"news-13806","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/09\/12\/news-13806\/","title":{"rendered":"6 patch management best practices for businesses"},"content":{"rendered":"<div>\n<p paraid=\"3\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{178}\"><span data-contrast=\"auto\" xml:lang=\"EN\">Patching is a thorn in the side of many businesses today: Everything from keeping up with the volume of patches to prioritizing what needs to be patched first can cause major delays in a business&#8217;s patching process.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span>&nbsp;<\/p>\n<\/p><\/div>\n<div>\n<p paraid=\"5\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{188}\"><span data-contrast=\"auto\" xml:lang=\"EN\">Needless to say, businesses are looking to streamline their patch management process as much as possible. Patch management refers to applying software updates for operating systems and applications and deploying them to eliminate known security vulnerabilities. With certain patch management best practices, you can help ensure a smoother patching process.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p paraid=\"7\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{198}\"><span data-contrast=\"auto\" xml:lang=\"EN\">In this post, we&rsquo;ll give you six patch management best practices for businesses.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<h3 role=\"heading\" aria-level=\"3\" paraid=\"8\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{204}\"><span data-contrast=\"none\" xml:lang=\"EN\">1. Establish a baseline inventory<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/h3>\n<\/p><\/div>\n<div>\n<p paraid=\"9\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{213}\"><span data-contrast=\"auto\" xml:lang=\"EN\">It is essential to start with a baseline inventory of your production systems because you&#8217;ll need it to assess the current state of patching in your organization. Here it would be best if you had a solution that uses <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\" target=\"_blank\">CVSS 3.1<\/a> because the severity of the patch is key to making a decision later.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><span data-contrast=\"auto\" xml:lang=\"EN\"><\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/p>\n<p paraid=\"9\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{213}\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">Besides CVSS, standardization is an essential part of the patch management process. However, multiple versions of an application running in production drive up support costs and increase security risks. Therefore, one of your primary goals should be to determine the version of each operating system and application your users should be running and devise a plan for standardizing around your preferred version. The process sometimes involves more than just upgrading to the latest version. There may be dependencies that must be upgraded before deploying your chosen version, or hardware requirements to consider.<\/span><\/p>\n<\/p><\/div>\n<div>\n<h3 role=\"heading\" aria-level=\"3\" paraid=\"12\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{229}\"><span data-contrast=\"none\" xml:lang=\"EN\">2. Categorize and group each asset by risk and priority<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/h3>\n<\/p><\/div>\n<div>\n<p paraid=\"13\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{238}\"><span data-contrast=\"auto\" xml:lang=\"EN\">Performing all these upgrades and patch deployments at the same time would be incredibly risky; for example, servers that host critical applications require testing (to verify) and scheduling a possible reboot.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/p>\n<p paraid=\"13\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{238}\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">In terms of organization best practices,&nbsp;one&nbsp;recommendation is creating a nested group.&nbsp;Take a group of endpoints in sales, for example, where &ldquo;revenue recognition&rdquo; is a subgroup of sales. Grouping and subgrouping in Malwarebytes Nebula allows the administrator to apply critical severity patches to a specific group of endpoints. <a href=\"https:\/\/service.malwarebytes.com\/hc\/en-us\/articles\/4413802743699-Manage-groups-in-Malwarebytes-Nebula\">For further reading,&nbsp;see&nbsp;this document.<\/a><\/span><\/p>\n<\/p><\/div>\n<div>\n<h3 paraid=\"15\" paraeid=\"{de78af56-6ebb-4a9d-9486-e0cd145a5d9c}{248}\"><span data-contrast=\"auto\" xml:lang=\"EN\"><\/span><span data-contrast=\"none\" xml:lang=\"EN\">3. Test the patch stability<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/h3>\n<\/p><\/div>\n<div>\n<p paraid=\"18\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{12}\"><span data-contrast=\"auto\" xml:lang=\"EN\">The need for testing must be balanced against the need to address the security vulnerability. Some organizations use a relatively short testing phase for critical patches but perform more in-depth testing for patches that are designed to address less serious vulnerabilities.<\/span><\/p>\n<p paraid=\"18\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{12}\">So, what&#8217;s the difference between short-testing and in-depth testing? Short testing is installing the patch on one or two target host machines and ensuring the critical application and operating system remain operational after a reboot. Long testing includes the steps in short testing but adds a &ldquo;soak period&rdquo; where the testing includes a variety of host systems, and the testing period is extended to ensure compatibility.<\/p>\n<\/p><\/div>\n<div>\n<h3 role=\"heading\" aria-level=\"3\" paraid=\"21\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{28}\"><span data-contrast=\"none\" xml:lang=\"EN\">4. Identify endpoints that need patching<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/h3>\n<\/p><\/div>\n<div>\n<p paraid=\"22\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{37}\"><span data-contrast=\"auto\" xml:lang=\"EN\">The next step in the process is to determine which endpoints to patch. A good patch management application can help you with a nested grouping of your endpoints. The collection of your endpoint should represent how essential they are to your organization.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p paraid=\"24\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{47}\"><em><span data-contrast=\"auto\" xml:lang=\"EN\"><strong>Note<\/strong>:<\/span><span data-contrast=\"auto\" xml:lang=\"EN\"> If the team decides not to deploy a particular patch, your organization needs a compensating control or solution to mitigate the risk of exploitation (mitigation&nbsp;versus prevention). In addition to an EDR solution, we recommend cyber insurance to mitigate worst-case scenarios.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/em><\/p>\n<\/p><\/div>\n<div>\n<h3 role=\"heading\" aria-level=\"3\" paraid=\"25\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{55}\"><span data-contrast=\"none\" xml:lang=\"EN\">5. Pilot deployment of sample of patches<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/h3>\n<\/p><\/div>\n<div>\n<p paraid=\"26\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{64}\"><span data-contrast=\"auto\" xml:lang=\"EN\">A pilot deployment to a representative sample of the user base prior to performing an organization-wide deployment helps to verify that the patch is indeed safe for production use. It gives you one last chance to catch any issues that did not surface during lab testing.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p paraid=\"28\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{74}\"><em><span data-contrast=\"auto\" xml:lang=\"EN\"><strong>Note<\/strong>:<\/span><span data-contrast=\"auto\" xml:lang=\"EN\"> Microsoft VSS snapshots were explicitly designed to roll back an endpoint image if a patch causes a catastrophic failure. Therefore, schedule your patch deployment to be after VSS snapshots, in case you need to roll back an endpoint image quickly.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/em><\/p>\n<\/p><\/div>\n<div>\n<h3 role=\"heading\" aria-level=\"3\" paraid=\"29\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{82}\"><span data-contrast=\"none\" xml:lang=\"EN\">6. Document systems pre- and post-patching<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/h3>\n<\/p><\/div>\n<div>\n<p paraid=\"30\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{91}\"><span data-contrast=\"auto\" xml:lang=\"EN\">Documenting the state of your systems before and after a patch is applied is essential. That way, if problems begin to occur later, it will be easier to determine if they can be attributed to an applied patch.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">The documentation can be as simple as a spreadsheet with the hostname, the patch level, the date when the patch was applied, the specific patch, and the type of testing performed (short versus long) if any. Regardless, documentation is important, so that you know what happened, when it happened, and who did it&mdash;this information will assist you in troubleshooting problems, should one arise.<\/span><\/p>\n<\/p><\/div>\n<div>\n<h2 role=\"heading\" aria-level=\"2\" paraid=\"33\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{107}\"><span data-contrast=\"auto\" xml:lang=\"EN\">Act swiftly through the patching process and neutralize the greatest risks&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/h2>\n<\/p><\/div>\n<div>\n<p paraid=\"34\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{116}\"><span data-contrast=\"auto\" xml:lang=\"EN\">In a world where so many data breaches happen because a patch for a known vulnerability was available but not applied, businesses are right to be proactive in their patch management activities. However, patching is still a challenge for many businesses, who can&rsquo;t easily track whether vulnerabilities are being patched in a timely manner or who are adverse to taking critical applications offline in order to patch them.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p paraid=\"36\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{126}\"><span data-contrast=\"auto\" xml:lang=\"EN\">The six patch management&nbsp;best practices we outlined in this post can help frame a logical workflow to your patch management activities, helping you reduce the risk of issues arising during your patching process.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p paraid=\"38\" paraeid=\"{21cb6fcc-a4ab-4328-a15f-a4d5f3b8898a}{136}\"><span data-contrast=\"auto\" xml:lang=\"EN\">Want to learn more about what vulnerability assessment and patch management look like in action? Check out our <\/span><a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN\">Vulnerability and Patch Management<\/span><\/a><span data-contrast=\"auto\" xml:lang=\"EN\"> landing page or watch the demos below.<\/span><\/p>\n<\/p><\/div>\n<h5 dir=\"ltr\">Vulnerability Assessment:<\/h5>\n<h5 style=\"text-align: center;\"><iframe loading=\"lazy\" width=\"100%\" height=\"420\" src=\"https:\/\/www.youtube.com\/embed\/AxEhfDHtuG8\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\" style=\"\"><\/iframe><\/h5>\n<h5 dir=\"ltr\">Patch Management:&nbsp;<\/h5>\n<h5 style=\"text-align: center;\"><iframe loading=\"lazy\" width=\"100%\" height=\"420\" src=\"https:\/\/www.youtube.com\/embed\/M5nhMDUiZvQ\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\" style=\"\"><\/iframe><\/h5>\n<h5 style=\"text-align: left;\">More resources:<\/h5>\n<h5 style=\"text-align: left;\"><a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\/business\/what-is-patch-management\">What is patch management?<\/a><\/h5>\n<h5 style=\"text-align: left;\"><a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\/business\/what-is-vulnerability-management\">What is vulnerability assessment?<\/a><\/h5>\n<h5 style=\"text-align: left;\"><a href=\"https:\/\/www.malwarebytes.com\/blog\/podcast\/2022\/04\/why-our-software-has-so-many-vulnerabilities-with-tanya-janca-lock-and-code-s03e09\">Podcast: Why software has so many vulnerabilities<\/a><\/h5>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/09\/6-patch-management-best-practices-for-businesses\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='left'>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/business' rel='category tag'>Business<\/a><\/p>\n<p>Patching is a thorn in the side of many businesses today: Everything from keeping up with the volume of patches to prioritizing what needs to be patched first can cause major delays in a business&#8217;s patching process. In this post, we\u2019ll give you six patch management best practices for businesses. <\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/www.malwarebytes.com\/blog\/business\/2022\/09\/6-patch-management-best-practices-for-businesses' title='6 patch management best practices for businesses'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel='nofollow' href='https:\/\/www.malwarebytes.com\/blog\/business\/2022\/09\/6-patch-management-best-practices-for-businesses'>6 patch management best practices for businesses<\/a> appeared first on <a rel='nofollow' href='https:\/\/www.malwarebytes.com'>Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-20073","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20073"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20073\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20073"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}