Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Ignore Patches at Your Peril: Page 2 of 2

Perhaps the most difficult problems arise from mobile devices such as laptops and PDAs, which may have been infected by a vulnerability exploit but remain inaccessible until they reconnect to the main network, when they may pose a serious threat to infrastructure integrity. The heterogeneity of data center environments is also a major added complexity, with underlying operating systems and application environments bringing more difficulty in applying a patch only where it is appropriate.

In 2003, the U.S. Internal Revenue Service managed the problem of deploying patches, designed to block the attack of the W.32Blaster Worm, by using IBM Corp.'s (NYSE: IBM) solutions based on autonomic computing. The patch was successfully rolled out to 5,000 servers and a combined total of 125,000 desktops and laptops within the space of a week, using Tivoli Software Distribution and Tivoli Event Management. However, this level of investment in automated procedures is still quite rare -- most organizations do not, as yet, have sufficient investment in autonomic resources to ensure that a new patch can reliably be rolled out to every required point in the enterprise network, depending instead on human overseers taking responsibility for the success (or possible failure) of the task.

Organizations need to adopt a patching methodology as soon as possible. This must include a process whereby emerging patches are rapidly evaluated, and procedures to control the rapid and secure patching of network resources, as well as a measurement for compliance that verifies the success of the patching. The methodology must be an integrated part of the organization's security policy, to which the agreement of operational management is obtained in order to ensure that the policy is rooted in business priorities. Most importantly of all, such a policy must be seen to be active, and highly pervasive, throughout the organization rather than just in its data center.

Alan Lawson and Alan Rodger, Research Analysts, Butler Group