To fill this gap, Microsoft is sponsoring the development of an open patch management metrics model called Project...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Quant. It was created by the information security research and advisory firm Securosis LLC, and aims to provide a framework to help organizations of all sizes and industries evaluate and improve the total cost of the patch management cycle, from testing patches to actual deployment.
The project, released in July, has 10 phases in its "patch management process lifecycle." Phase Two, titled "Evaluate," covers the initial prioritization phase to determine the nature of the patch, its relevance and general priority for your organization. But this is a quantified metrics model focused on understanding patching costs and improving patching activities. It doesn't provide metrics or instructions on how to determine the criticality of a particular patch to your organization. It's more interested in the steps involved and how long it takes to complete them.
You obviously need to determine if a patch is relevant to your environment and whether the threat posed by a particular vulnerability is within your risk tolerance. Vulnerability criticality is essential for calculating a patch's significance, as is the existence of a known exploit that uses the vulnerability being patched as an attack vector. You may want to consider trying the Secunia Enterprise Vulnerability Manager or Secunia Vulnerability Intelligence Feed. The vulnerability reports provided by these offerings clearly show the criticality of vulnerabilities, not something all vendors' alerts do.
The project is certainly in its early days, but it's well worth following while the model is further refined and the project puts out additional research findings. It's always helpful to be able to see how your own processes and maturity align with the model, particularly if it starts being used for industry benchmarking. The model is vendor-neutral and adaptable to different circumstances as not all users will utilize all elements of the model.
Related Q&A from Michael Cobb
Remote wipe isn't always an option when it comes to securing enterprise BYOD use. Learn how selective wipe and enterprise wipe technology can help ...continue reading
While a walled garden can help secure Web browsers, they are not seen as beneficial by all. Expert Michael Cobb explains why.continue reading
Expert Michael Cobb explains how reverse engineering can be made more difficult with an approach called Hardened Anti-Reverse Engineering System or ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.