Security.com

How to conduct security patch validation and verification

By Michael Cobb, Felicia Nicastro

Validation and verification are important steps in the security patch management lifecycle. They help to determine the impact of a patch on the security and efficiency of an organization's IT assets.

Patch validation is the process of examining newly available patches to see which ones apply to the organization's IT environment and then testing the chosen patches to determine if they could cause problems. The software patch testing process usually requires building a test environment that mimics a representative segment of the overall infrastructure.

Verify patch deployment

The patch verification process that follows, in contrast, involves checking related files, binary versions and registry settings to confirm that a patch has taken effect. If the patch management tool used by the organization is not capable of doing so, the process must be done manually. In addition, a vulnerability scanner can be used to verify that vulnerabilities the patch is intended to mitigate are no longer present or exploitable.

For verification to be trustworthy, the patch management tool used to deploy the security patch must have the ability to monitor patched systems after deployment. It should also verify that the security patch was properly installed and identify any post-deployment issues by running smoke tests. The tool should also keep track of the systems that have been patched. If the tool is unable to do all these things, the organization needs to create a manual method or subprocedure to complete the different verification tasks.

Review patch status

The organization's change control procedure -- be it a tool, ticket or form -- should be updated as each step is completed and a report generated to record the status of each patch. These reports can be generated by the patch management tool or the change management system used by the organization. The reports get distributed to the appropriate staff, including the patch management team and IT personnel involved in the review phase.

Each report should contain the following information:

KPIs should be developed for the patch management procedure. They enable the organization to measure the effectiveness and efficiency of its patch management initiatives. KPIs for patch management include the ones seen in the figure here.

Those responsible for patch management should regularly analyze the reports and use the KPIs and other information to answer the following questions about their remediation and response processes:

This information establishes the baseline performance of the patch management procedure, which can then be used to expose the accuracy and effectiveness of the patch against attacks. Completing this last phase of the procedure ensures an organization's patch management initiative is proactive.

Michael Cobb, CISSP-ISSAP, is a renowned security author with more than 20 years of experience in the IT industry.

Felicia Nicastro is author of the book Security Patch Management.

16 Apr 2024

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement