Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Next Steps in Enterprise Patch Management from NIST
Cybersecurity

Next Steps in Enterprise Patch Management from NIST

Chris HughesBy Chris HughesJanuary 17, 2022Updated:April 13, 20235 Mins Read
Facebook Twitter LinkedIn Email
Enterprise Patch Management
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Anyone who’s been in or around IT is familiar with the age-old practice of patch management. Even non-IT professionals are familiar with it, as patches and updates are regularly delivered to their mobile and connected devices. While many of the concepts around patch management haven’t changed, the technology has. So, it warrants a revisit of patch management best practices.

That is exactly what NIST delivers in their latest draft of 800-40 rev. 4, “Guide to Enterprise Patch Management Planning: Preventative Maintenance for Technology.” The guidance starts off by emphasizing how the perimeter-based security approach of legacy IT is long gone. Many technologies have internet exposure, and in today’s dynamic threat landscape, it isn’t if an adversary will be inside your network, but when.

There’s also the well-known push and pull between business leadership and IT staff in needing to update systems while mitigating business disruption.

Recommendations for Enterprise Patch Management

While NIST’s guidance dives into both the software vulnerability management lifecycle and risk response execution activities, we will focus on some of the key recommendations for enterprise patch management planning. These include mitigating disruptions; inventorying your software assets (hello CIS Critical Control #2); defining your risk response scenarios, and more.

Everyone in cybersecurity is likely familiar with your options for risk—those being acceptance, mitigation, transfer, or avoidance. How you decide, or neglect, to implement patch management practices will have inherent implications for how you’re addressing risk to your enterprise.

In the vein of reducing patching-related disruptions, NIST makes several recommendations, some easier said than done. These include hardening your software by implementing industry and vendor guidance or security best practices. This is possible but also has dependencies on the design of the software in question.

The same goes for your ability to acquire software likely to have fewer vulnerabilities. Even the most notable and known software vendors regularly release updates and patches for their software. Some would argue that the more ubiquitous a software is, the more likely it is for vulnerabilities or functional gaps to be identified and need to be addressed. No software is flawless.

They also recommend working with software development partners that are likely to produce more secure code (e.g. remember our discussion on software security maturity?). NIST also recommends deploying applications in ways to minimize patch disruption. One such way is embracing a containerized application model, where you can update the container in a registry, then roll it out using scaling strategies and other methods to minimize the end user ever realizing an update is underway.

Inventory Software and Assets

Inventorying your software and assets is absolutely critical. It is and has been among the top security controls for many years. Without an accurate and well-kept inventory, it can be nearly impossible to identify where patches are needed or where software even exists in your enterprise. However, as NIST acknowledges, having a perfect inventory, especially in today’s dynamic technology environments can be incredibly difficult, albeit still absolutely necessary.

Once an inventory is created (and maintained in perpetuity), organizations can take steps such as determining which assets are the most critical to business operations, have legal or regulatory ramifications, or even restrictions on risk responses (e.g. can only be modified during specific windows). Organizations should also assign assets into groups with similar characteristics, making it easier to logistically manage the large amount of assets most organizations are dealing with. The recommendations also include defining risk responses for those assets, such as routine patching, emergency patch (e.g. log4j) and other options.

One of the more important and practical recommendations in the guidance involves choosing actionable enterprise-level patching metrics. If you’ve worked your way up through security, particularly on the defensive side, you’ve undoubtedly experienced the fatigue of chasing never ending patch/vulnerability metrics. However, context matters. How many vulnerabilities you’ve addressed isn’t as relevant if it doesn’t also provide insight into the criticality of the assets to which those patches apply. Security is in the business of risk management, or enabling the business to make risk-informed decisions. Blanket vulnerability metrics not tied to organizationally defined criteria, such as asset criticalities, are nearly useless.

Software Maintenance and SLAs

Patch management metrics should also take the audience into consideration, as the CIO or even the board will have a different interest or focus than say the system administrator. Audience-oriented actionable metrics are the goal.

Lastly, as organizations continue to work with a dizzying array of vendors, managed service providers, cloud, and more, software maintenance must be a consideration in acquisition activities. The organization should understand how the vendor will respond to vulnerabilities. What their development lifecycle looks like, service level agreements, and more can make all the difference between having a response software vendor or partner—or being left in the cold when the next “insert name here” zero day is discovered.

Cybersecurity Cybersecurity channel Cybersecurity is an Enabler Enterprise Patch Management featured NIST
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Snowflake Powers LA28 Olympics as Official Data Collaboration Provider, Showcasing AI-Driven Innovation on a Global Stage

June 6, 2025

Accenture and SAP Launch Tailored AI-Powered Solutions for High-Growth Companies

June 6, 2025

Snowflake Follows 34% RPO Spike with AI Data Cloud New-Product Blitz

June 5, 2025

AI Agent Interoperability: Community Project Details MCP Vulnerabilities, Enterprise Security Measures

June 5, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Snowflake Powers LA28 Olympics as Official Data Collaboration Provider, Showcasing AI-Driven Innovation on a Global Stage
  • Accenture and SAP Launch Tailored AI-Powered Solutions for High-Growth Companies
  • Snowflake Follows 34% RPO Spike with AI Data Cloud New-Product Blitz
  • AI Agent Interoperability: Community Project Details MCP Vulnerabilities, Enterprise Security Measures
  • Snowflake’s 1-2 Combo: RPO Jumps 34%, Then AI/Data Product Blitz

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.