10.10.2014 Views

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.3.2. Perform Patch and Vulnerability Management<br />

Agencies should perform patch and vulnerability management to minimize the<br />

number <strong>of</strong> incidents to which an agency must respond by mitigating<br />

vulnerabilities before they can be exploited.<br />

6.3.2.1 Monitor for Threats and Associated Remediations<br />

To ensure that treats and vulnerabilities are discovered in a timely<br />

fashion, active monitoring should be performed:<br />

• Make use <strong>of</strong> a variety <strong>of</strong> channels to monitor for threats and<br />

vulnerabilities:<br />

• Continue to monitor all channels after initial notification in the<br />

event that updated information is provided.<br />

6.3.2.2 Prioritize Implementation <strong>of</strong> Remediations<br />

Threats and vulnerabilities should be addressed in order <strong>of</strong> their<br />

criticality, not necessarily in order <strong>of</strong> their discovery. Prioritization is<br />

essential for this:<br />

• Prioritize remediations according to established standards.<br />

6.3.2.3 Perform Pre-Implementation Testing <strong>of</strong> Remediations<br />

Before remediations are implemented into a production environment<br />

they are to be tested to determine if any negative impacts on the<br />

target system or other systems will occur:<br />

• Verify the authenticity and integrity <strong>of</strong> any remediation that is<br />

provided by third parties.<br />

• Perform a malware scan against any third party s<strong>of</strong>tware<br />

remediation before testing or implementation.<br />

• Configure a test environment to match the production<br />

environment as closely as possible:<br />

• Implement the remediation into the test environment<br />

according to any pre-established standards and observe the<br />

results. If systems perform as expected proceed to production<br />

implementation. If not, seek an alternate remediation.<br />

6.3.2.4 Deploy Prioritized and Tested Remediations<br />

After remediations have been fully vetted they are to be<br />

implemented to production systems:<br />

• Prior to implementing any remediation, follow appropriate<br />

Notification <strong>of</strong> Work processes (see section 6.3.1 <strong>of</strong> these<br />

Non-Mandatory Procedures).<br />

• Prior to implementing any remediation, follow appropriate<br />

Change Control standards (see section 5.1.3 <strong>of</strong> these Non-<br />

Mandatory Procedures).<br />

• Implement the remediation into the production environment<br />

according to the pre-established and pre-tested standards.<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!