To fill this gap, Microsoft is sponsoring the development of an open patch management metrics model called Project...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Quant. It was created by the information security research and advisory firm Securosis LLC, and aims to provide a framework to help organizations of all sizes and industries evaluate and improve the total cost of the patch management cycle, from testing patches to actual deployment.
The project, released in July, has 10 phases in its "patch management process lifecycle." Phase Two, titled "Evaluate," covers the initial prioritization phase to determine the nature of the patch, its relevance and general priority for your organization. But this is a quantified metrics model focused on understanding patching costs and improving patching activities. It doesn't provide metrics or instructions on how to determine the criticality of a particular patch to your organization. It's more interested in the steps involved and how long it takes to complete them.
You obviously need to determine if a patch is relevant to your environment and whether the threat posed by a particular vulnerability is within your risk tolerance. Vulnerability criticality is essential for calculating a patch's significance, as is the existence of a known exploit that uses the vulnerability being patched as an attack vector. You may want to consider trying the Secunia Enterprise Vulnerability Manager or Secunia Vulnerability Intelligence Feed. The vulnerability reports provided by these offerings clearly show the criticality of vulnerabilities, not something all vendors' alerts do.
The project is certainly in its early days, but it's well worth following while the model is further refined and the project puts out additional research findings. It's always helpful to be able to see how your own processes and maturity align with the model, particularly if it starts being used for industry benchmarking. The model is vendor-neutral and adaptable to different circumstances as not all users will utilize all elements of the model.
Dig Deeper on Microsoft Patch Tuesday and patch management
Related Q&A from Michael Cobb
Can two-factor authentication be applied to a mobile device that's used as a 2FA factor? Michael Cobb explores the different knowledge factors and ...continue reading
Running a private certificate authority can pose significant risks and challenges to meet baseline requirements. Michael Cobb explores what ...continue reading
A recently discovered Android app permissions flaw can expose users to attacks. Michael Cobb explains what the risks are and how Android O security ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.