A Checklist for Developing Defenses

Step

Description

Obtain a source for vulnerability and patch information.

This may be accomplished by gathering freely available public information, or more optimally, subscribing to a commercial intelligence service.

Develop a mechanism to prioritize vulnerabilities.

This should be combined with a parallel capability incorporating (1) asset discovery, (2) vulnerability discovery, and/or (3) patch discovery.

Develop a deployment policy.

Develop a policy around the scheduling of both expected and unexpected security patches.

Procure deployment technologies.

Deploy the appropriate technology to facilitate the actual patch installation across your enterprise.

Recommended Reading

  • https ://www.first.org/cvss/

  • http://www.microsoft.com/technet/security/tools/mbsahome.mspx

  • http://www.microsoft.com/windowsserversystem/updateservices/evaluation/overview.mspx



Extreme Exploits. Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net