* Guest writer doles out grades for Slammer situation My friend and colleague Jim Reavis recently sent me the latest issue of his “CSOinformer” security newsletter, and I was so taken by his comments on the recent Slammer incident that I asked him for permission to republish them here. He has very kindly allowed me to print the following essay (lightly edited) from his excellent publication.“I” refers to Jim, so please direct your praise (or abuse) to him at mailto:jim@reavis.org with a copy to me mailto:mkabay@norwich.edu when responding to any controversial bits below.* * *The Slammer (or Sapphire) worm has come and is mostly gone. This worm halted the Internet in many parts of the world and stopped many critical business functions within corporations. How do I grade the players in this latest saga? Let’s take a look: * Microsoft: B-. Seriously, how much blame can we ascribe to Redmond when they released a security advisory six months before the attack, complete with a patch for the affected SQL Servers? They cannot get an “A” because they released the insecure product in the first place; they get the minus for having a lot of security advisories to wade through and for making the process for patching computers so painful, as I’ll discuss at the end of this column.* Information security industry: D. If there is going to be an information security industry in the long run, these are the moments in which it needs to shine. Vulnerability assessment companies can claim they warned you, but they didn’t do too much to help you. Many companies claimed that they could help – the next time Slammer attacked. There were some very good examples of smaller companies who trapped Slammer with anomaly detection technology or prevented it with patch management. But the big guys – the security companies most of us have standardized on – seemed to have very few answers. * Systems administrators: F. We all need to take personal responsibility for the security of our networks. The underlying vulnerability for Slammer was announced on July 24, 2002, by Microsoft bulletin MS02-039 and given the maximum severity rating. History tells us that nearly all wide-scale attacks are based upon known vulnerabilities. Microsoft released 72 security bulletins in 2002, not a tiny number, but not exactly the population of Hong Kong either. A systems administrator reading MS02-039 should have seen the hallmarks of a potential problem: specifically, the vulnerability could be automatically exploited without any local interaction. However, most chose not to apply the patch.Clearly, what is needed is sophisticated patch management technologies to aid organizations in managing updates, which will only increase in frequency. Among the key needs:* Scalability to accurately identify vulnerabilities in large networks.* Regression testing and the ability to pilot patches.* Wisdom to know which patches should be installed and when.* Ability to simply roll back patches that have unintended side effects. * Work-around information for vulnerabilities lacking a suitable patch.* Ability to integrate patch management into enterprise systems-management consoles.Everyone makes the same comment: Patching is difficult. Rarely does anyone explore why. What’s the main reason, the specific detailed single reason why patches do not get installed? Because, for most patches applied, the system must be rebooted. When you reboot a computer, a hundred different things can happen and only one of them is good. The Reboot Dilemma is the undoing of many a systems administrator. Anyone who has worked in the business for more than a year has their own personal horror story of an upgrade gone awry, and a two-hour project turning into a lost weekend. We need to figure out how to install service packs and hotfixes dynamically – without requiring a reboot. If any of the nascent patch management companies could figure this out, I’ll stand in line for their IPO.“CSOinformer” is edited by Jim Reavis (mailto:jim@reavis.org), founder of SecurityPortal and longtime industry analyst. For full details about the publication, including subscriptions and site licenses, visit http://www.reavis.org or download https://www.reavis.org/csoi.pdf ***Come to the Fifth Annual e-ProtectIT Infrastructure Protection Conference at Norwich University in Northfield, Vt., March 25-27, 2003. Details at: http://www.e-protectIT.org Related content news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking news Gartner: Just 12% of IT infrastructure pros outpace CIO expectations Budget constraints, security concerns, and lack of talent can hamstring infrastructure and operations (I&O) professionals. By Denise Dubie Dec 07, 2023 4 mins Network Security Data Center Industry feature Data centers unprepared for new European energy efficiency regulations Regulatory pressure is driving IT teams to invest in more efficient servers and storage and improve their data-center reporting capabilities. By Maria Korolov Dec 07, 2023 7 mins Enterprise Storage Green IT Servers news analysis AMD launches Instinct AI accelerator to compete with Nvidia AMD enters the AI acceleration game with broad industry support. First shipping product is the Dell PowerEdge XE9680 with AMD Instinct MI300X. By Andy Patrizio Dec 07, 2023 6 mins CPUs and Processors Generative AI Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe