In the wake of the devastating (Not)Petya attack, Microsoft set out to understand why some customers weren’t applying cybersecurity hygiene, such as security patches, which would have helped mitigate this threat. We were particularly concerned with why patches hadn’t been applied, as they had been available for months and had already been used in the WannaCrypt worm—which clearly established a ”real and present danger.”
We learned a lot from this journey, including how important it is to build clearer industry guidance and standards on enterprise patch management. To help make it easier for organizations to plan, implement, and improve an enterprise patch management strategy, Microsoft is partnering with the U.S. National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE).
NIST and Microsoft are extending an invitation for you to join this effort if you’re a:
- Vendor—Any vendor who has technology offerings to help with patch management (scan, report, deploy, measure risk, etc.).
- Organization or individual—All those who have tips and lessons learned from a successful enterprise management program (or lessons learned from failures, challenges, or any other situations).
If you have pertinent learnings that you can share, please reach out to firstname.lastname@example.org.
During this journey, we also worked closely with additional partners and learned from their experience in this space, including the:
- Center for Internet Security (CIS)
- U.S. Department of Homeland Security (DHS) Cybersecurity
- Cybersecurity and Infrastructure Security Agency (CISA) (formerly US-CERT / DHS NCCIC)
A key part of this learning journey was to sit down and listen directly to our customer’s challenges. Microsoft visited a significant number of customers in person (several of which I personally joined) to share what we learned—which became part of the jointly endorsed mitigation roadmap—and to have some really frank and open discussions to learn why organizations really aren’t applying security patches.
While the discussions mostly went in expected directions, we were surprised at how many challenges organizations had on processes and standards, including:
- “What sort of testing should we actually be doing for patch testing?”
- “How fast should I be patching my systems?”
This articulated need for good reference processes was further validated by observing that a common practice for “testing” a patch before a deployment often consisted solely of asking whether anyone else had any issues with the patch in an online forum.
This realization guided the discussions with our partners towards creating an initiative in the NIST NCCoE in collaboration with other industry vendors. This project—kicking off soon—will build common enterprise patch management reference architectures and processes, have relevant vendors build and validate implementation instructions in the NCCoE lab, and share the results in the NIST Special Publication 1800 practice guide for all to benefit.
Applying patches is a critical part of protecting your system, and we learned that while it isn’t as easy as security departments think, it isn’t as hard as IT organizations think.
In many ways, patching is a social responsibility because of how much society has come to depend on technology systems that businesses and other organizations provide. This situation is exacerbated today as almost all organizations undergo digital transformations, placing even more social responsibility on technology.
Ultimately, we want to make it easier for everyone to do the right thing and are issuing this call to action. If you’re a vendor that can help or if you have relevant learnings that may help other organizations, please reach out to email@example.com. Now!
To learn more about how you can protect your time and empower your team, check out the cybersecurity awareness page this month.