To fill this gap, Microsoft is sponsoring the development of an open patch management metrics model called Project...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Quant. It was created by the information security research and advisory firm Securosis LLC, and aims to provide a framework to help organizations of all sizes and industries evaluate and improve the total cost of the patch management cycle, from testing patches to actual deployment.
The project, released in July, has 10 phases in its "patch management process lifecycle." Phase Two, titled "Evaluate," covers the initial prioritization phase to determine the nature of the patch, its relevance and general priority for your organization. But this is a quantified metrics model focused on understanding patching costs and improving patching activities. It doesn't provide metrics or instructions on how to determine the criticality of a particular patch to your organization. It's more interested in the steps involved and how long it takes to complete them.
You obviously need to determine if a patch is relevant to your environment and whether the threat posed by a particular vulnerability is within your risk tolerance. Vulnerability criticality is essential for calculating a patch's significance, as is the existence of a known exploit that uses the vulnerability being patched as an attack vector. You may want to consider trying the Secunia Enterprise Vulnerability Manager or Secunia Vulnerability Intelligence Feed. The vulnerability reports provided by these offerings clearly show the criticality of vulnerabilities, not something all vendors' alerts do.
The project is certainly in its early days, but it's well worth following while the model is further refined and the project puts out additional research findings. It's always helpful to be able to see how your own processes and maturity align with the model, particularly if it starts being used for industry benchmarking. The model is vendor-neutral and adaptable to different circumstances as not all users will utilize all elements of the model.
Dig Deeper on Security patch management and Windows Patch Tuesday news
Related Q&A from Michael Cobb
Google's second Android Security Report revealed changes and upgrades made to the OS. Expert Michael Cobb covers the important takeaways for ...continue reading
A web shell from the JexBoss security tool was used to exploit servers through an unpatched JBoss vulnerability. Expert Michael Cobb explains how to ...continue reading
The Android Trojan Triada has the ability to replace a device's system functions with its own. Expert Michael Cobb explains how to mitigate the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.