Setting practical time frames to remedy security vulnerabilities Padlock – security management


Cybersecurity and risk leaders should tie vulnerability management practices to their organization’s specific needs, not a mythical standard.
While patching all the Windows systems at a large international bank in three days is technically possible, the subsequent business disruption would most likely make this an unviable solution.
About the author
Craig Lawson is a Research Vice President with Gartner.
The question then becomes, what is a realistic time frame for fixing and addressing security vulnerabilities?
A Swiss bank, a UK retailer, and a Chinese government agency would each have vastly different answers – as the threat landscape is completely different for each individual organization.
Unfortunately, the recognized “industry standard” for vulnerability remediation time frames rarely account for organization-specific constraints, technology cohabitation considerations, internal policies or external compliance requirements.
The reality is far more nuanced.
What’s important is turning ‘whether a platform gets patched’ into ‘whether the specific risk of platform vulnerability has been sufficiently mitigated’.
To achieve this, organizations must take a more structured risk- and fact-based approach to vulnerability management as part of an overall security program.
How fast is fast enough in vulnerability management?
The volume of reported vulnerabilities, alone, means that organizations are challenged to address and amend them in a suitable, timely manner.
Based on how quickly vulnerabilities can be exploited, organizations need to be equipped to implement emergency remediation on key systems within hours of a vendor releasing a patch to address a vulnerability – in addition to investing heavily in mitigation measures. Refining their remediation process maturity is also essential to achieving nonemergency remediation across all system types within a matter of weeks, instead of months or years.
Four best practices can operationalize effective remediation time frames:
1. Align vulnerability management to risk appetite
Organizations have a ceiling for the speed with which they can patch or compensate for vulnerabilities. This upper limit is driven by each company’s appetite for operational risk, IT operational capacity/capabilities and capacity to absorb disruption when trying to remediate vulnerable technology platforms.
Security leaders can align vulnerability management practices to their organization’s needs and requirements by evaluating specific use cases, measuring operational risk appetite for particular risks or on a risk-by-risk basis, and determining remediation abilities and limitations.
2. Prioritize vulnerabilities based on risk
Organizations must apply comprehensive, risk-based vulnerability prioritization, based on considerations such as the severity of the vulnerability, current exploitation activity, business criticality and exposure of the affected system.
One of the biggest changes you can make is to focus on the vulnerabilities that are being exploited in the wild. That should be the number one goal and will ensure the biggest risks are tackled quickly and efficiently.
Companies can reduce their attack surface more efficiently while having less operational impact on the organization by merging compensating controls that can achieve virtual patching – such as intrusion detection and prevention systems, and web application firewalls with remediation solutions like patch management tools. Newer technologies, including breach and attack simulation (BAS) tools, can also offer insight into how your current security technologies are configured and whether they are capable of protecting you against a variety of threats similar to ransomware.
It is simply unfeasible to patch a system if the supplier hasn’t yet provided a patch, and the system is no longer supported for other reasons like software compatibility. It is important to note that highly regulated industries often have mandates which can limit your ability to perform functions such as patching.
Patching isn’t everything, though: it is hard, it can break things, and it takes time. It is important therefore to have a plan B – you need more arrows in your quiver than just patching.
If you do a better job with your vulnerability management program, you can reduce your attack surface substantially. This allows you to present a harder target for a threat actor trying to gain leverage inside your environment. That is why it is so important.
4. Use technologies to automate vulnerability analysis
By employing technologies that can automate vulnerability analysis, you can improve remediation windows and efficiency.
It is also essential to evaluate your current vulnerability assessment solutions and ensure they support more recent types of assets like cloud, containers and cyber-physical systems in your environment. If not, augment or replace the solution.
Cybersecurity and risk leaders should tie vulnerability management practices to their organization’s specific needs, not a mythical standard. While patching all the Windows systems at a large international bank in three days is technically possible, the subsequent business disruption would most likely make this an unviable solution. About the author…
Recent Posts
- Framework’s first tiny Desktop beautifully straddles the line between cute and badass
- Samsung Galaxy Z Fold 7 unofficial renders tease a slimmer design and a bigger, hidden-in-plain-sight upgrade
- Netflix drops an uneasy new teaser for You season 5, and I can’t help but laugh as killer Casanova Joe calls himself ‘the luckiest guy in New York’
- Popular Android financial help app is actually dangerous malware
- Our Favorite Internal SSD Is on Sale Right Now
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010