Optimal Policies for Security Patch Management

被引:24
|
作者
Dey, Debabrata [1 ]
Lahiri, Atanu [2 ]
Zhang, Guoying [3 ]
机构
[1] Univ Washington, Foster Sch Business, Seattle, WA 98195 USA
[2] Univ Texas Dallas, Jindal Sch Management, Richardson, TX 75080 USA
[3] Midwestern State Univ, Dillard Coll Business, Wichita Falls, TX 76308 USA
关键词
security; vulnerability; patching; patching policy; exploitation cost; setup cost; disruption cost; SOFTWARE; IMPACT;
D O I
10.1287/ijoc.2014.0638
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Effective patch management is critical to ensure the security of information systems that modern organizations count on today. Facing numerous patch releases from vendors, an information technology (IT) manager must weigh the costs of frequent patching against the security risks that can arise from delays in patch application. To this end, we develop a rigorous quantitative framework to analyze and compare several patching policies that are of practical interest. Our analyses of pure policies-policies that rely on a single metric such as elapsed time or patch severity level-show that certain policies are never optimal and no single policy may fit all information systems uniformly well. Depending on the context parameters, particularly the setup and business disruption costs for patching, either a time-based approach or an approach based on the cumulative severity level may be effective. To develop a more complete guideline for policy selection, we decipher hybrid policies that combine multiple metrics. Finally, we conduct extensive numerical experiments to verify the robustness of our analytical results. Overall, our paper establishes a comprehensive framework for analyzing various patching policies and furnishes useful insights for IT managers.
引用
收藏
页码:462 / 477
页数:16
相关论文
共 50 条
  • [1] Optimal security patch management policies maximizing system availability
    Uemura T.
    Dohi T.
    [J]. Journal of Communications, 2010, 5 (01): : 71 - 80
  • [2] SECURITY POLICIES AND THEIR CONNECTION WITH SECURITY STRATEGY AND SECURITY MANAGEMENT
    LIPPOLD, H
    STELZER, D
    KONRAD, P
    [J]. WIRTSCHAFTSINFORMATIK, 1992, 34 (04): : 367 - 377
  • [3] Integrated Management of Security Policies
    Paraboschi, Stefano
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 12 - 13
  • [4] Remediation graphs for security patch management
    Swarup, V
    [J]. SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 17 - 28
  • [5] Security Constrained Active and Reactive Optimal Power Management of Microgrid in Different Market Policies
    Al-Saadi, Mohammed K.
    Luk, Patrick C. K.
    Fei, Weizhong
    Bati, Akram
    [J]. 2016 UKACC 11TH INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2016,
  • [6] Optimal Key Generation Policies for MANET Security
    Al-Zubaidy, Hussein
    Lambadaris, Ioannis
    Viniotis, Yannis
    Huang, Changcheng
    Hwang, Ren-Hung
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [7] Dynamic Management of Security Policies in PrivOrBAC
    El Mokhtari, Jihane
    Kalam, Anas Abou El
    Benhaddou, Siham
    Leroy, Jean-Philippe
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (06) : 693 - 701
  • [8] MANAGEMENT OF SECURITY POLICIES IN VIRTUAL ORGANISATIONS
    Aziz, Benjamin
    Arenas, Alvaro
    Johnson, Ian
    Artac, Matej
    Cernivec, Ales
    Robinson, Philip
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 467 - 477
  • [9] Management and translation of filtering security policies
    Al-Shaer, ES
    Hamed, HH
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 256 - 260
  • [10] Linux Patch Management: With Security Assessment Features
    Midtrapanon, Soranut
    Wills, Gary
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS 2019), 2019, : 270 - 277