22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the “greater good.” We feel it is pointless to be concerned about the reasons<br />

people are constantly looking for new vulnerabilities. Most vendors react swiftly<br />

to provide updates to fix security vulnerabilities once they become aware of<br />

them.<br />

Software vulnerabilities generally fall into three categories:<br />

1. Operating system defects<br />

2. Application software defects<br />

3. Improper configuration<br />

Administrators can greatly mitigate security risks by applying software updates<br />

and recommended configuration changes in a timely manner. There have been<br />

many instances in the past few years of worm attacks or outbreaks that affect<br />

large number of systems. In many cases, the worms take advantage of known<br />

exploits that the vendor may have provided fixes for months before the worm was<br />

unleashed. It is your responsibility to make a review of vendor updates part of<br />

your security routine procedures. In some organizations, the system “owner” has<br />

the responsibility to monitor relevant vendor sites for updates at least monthly.<br />

Perhaps the biggest mistake an organization can make is to not apply updates<br />

because there is uncertainty over whether or not the exploit represents a risk in<br />

their current environment, or because the exploited feature is not being used.<br />

Should some business reason in the future cause the affected service or<br />

component to become enabled, you cannot rely on someone’s memory of<br />

reading a software product advisory that was not applicable at the time. Another<br />

strong possibility is that the affected service is enabled by default, whether you<br />

are using it or not, and the exploit uses the vulnerability as a doorway to other<br />

parts of a system. So our advice is to apply software updates regardless of<br />

whether you have the affected features implemented or not. There is always the<br />

possibility the feature in question will be enabled down the road, or already is<br />

even though you don’t use it.<br />

In some cases, when a vulnerability is reported or announced, it might become<br />

necessary to disable the component or service affected until a fix from the vendor<br />

becomes available. This type of temporary action must be considered by<br />

weighing the potential business impact against the potential risk. In cases where<br />

the vulnerability is due to default configuration settings, these are often the<br />

easiest exploits to eliminate by following the vendor’s recommendations.<br />

Workstations must be considered with equal importance to your servers with<br />

regard to applying updates. Human behavior is rarely predictable, therefore it<br />

becomes difficult to foresee all problems that can arise when a user connects to<br />

systems that are outside of your organization’s control. When you consider that<br />

the users’ workstations can connect to your internal systems, they easily can<br />

Chapter 3. Secure infrastructure requirements 111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!