Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

6 Tips for a Successful Patching Process

on January 27, 2011

Whether your servers run Windows or Linux, whether your workstations are Windows 7 or Macs, and no matter what vendor your network gear comes from, one of the most critical administrative tasks for admins of any system is patching. With new vulnerabilities announced every week, and with dozens, if not hundreds of different applications running on your network, having an effective patch management process in place is critical to maintaining the health and security of your systems.

1. Awareness

When it comes to patching, one of the most important things for you to do is to be aware of what is out there. All the major vendors include mailing lists that you can subscribe to so that you receive notifications of patches. It won’t hurt to subscribe to some of the other mailing lists like those from SANS or Bugtraq that let you know when there are vulnerabilities, even when patches aren’t released yet. Subscribe your IT or security team’s distribution list to make sure nothing is missed while someone is on vacation. See the end of this post for links to some of the major mailing lists.

2. Include applications

A growing number of exploits take advantage of applications that open or execute file types. Windows Update can take care of your operating system and Microsoft applications, but almost every computer on your network will have third-party applications, including PDF readers, media players, and other line of business applications. Make sure you stay informed of patches for all the applications that are a part of your image.

3. Test before you deploy

All vendors test their patches before releasing them, but it is virtually impossible for a vendor to test every possible combination of hardware, application, and driver, and they cannot test your proprietary applications developed internally. Have a set of machines that you deploy patches to first and test to make sure you don’t introduce any problems to your systems. Take advantage of virtualisation technologies when you can, or use your IT department and secondary servers if you have to, but make sure you test all patches before you roll them out to the entire organization, or to key servers.

4. Schedule maintenance windows

Patching requires time, bandwidth, and reboots, and all of these can interrupt normal processes. Even companies that run their business 24×7 need to have some established maintenance windows for normal patching, and a process in place to push emergency patches in the event of a zero-day exploit. By having a scheduled maintenance window, business operations can plan around, or at least be prepared for, potential disruptions when key systems reboot after patching.

5. Use a patch management system

Manual patching is time and labor intensive, error prone, and impossible to report upon. There are several excellent low cost patching systems on the market that can push patches, audit systems, and generate reports for management and security assessments.

6. Include a roll-back plan

No matter how much vendors test their patches, and how thoroughly you test your systems, there may come a time when a patch causes an issue, and you will need to roll it back. Make sure that when you push patches, everyone is aware, and if problems crop up after deployment, be prepared to first check those patches to see if they are a possible cause, and to uninstall them if necessary. With these six concepts at the foundation of your patching plan, you are well on your way to making patching a routine part of your administration, instead of a painful process that causes disruptions to the network. Here’s a list of mailing lists that you may want to subscribe to so as to always be up-to-date:

About the Author:

Ed Fisher is an information systems manager and blogger at several sites including his own site, http://retrohack.com. An InfoTech professional, aficionado of capsaicin, and Coffea canephora (but not together,) he has been getting my geek on full-time since 1993, and has worked with information technology in some capacity since 1986. Stated simply, if you need to get information securely from point A to B, he’s your guy. He is like "The Transporter," but for data, and without the car; and with a little more hair.

 
Comments
Tana January 27, 201110:35 pm

I guess it goes without saying that you should always have a recent backup – this is really a life saver when a patch goes wrong. It depends on what you patch, but sometimes a rollback isn’t possible and in such cases a backup could be the best thing to fall on.

Ed Fisher January 31, 20116:58 pm

Hi Tana,
That’s an excellent point, and one that did make a huge difference to me a couple of years ago.
Thanks for mentioning that!
Ed

Danny Sulivan March 14, 20118:55 am

To implement or use a a patch management system, you must follow several processes. These include the following (in exact order):

-detecting missing security update or patch
-assess the issue
-get or download the patch
-test the patch
-install the patch to your hardware and / or software systems
-be notified to new vulnerabilities about your hardware and / or software systems

Hope this helps.

Chow…