Optimal Policies for Security Patch Management

被引:29
作者
Dey, Debabrata [1 ]
Lahiri, Atanu [2 ]
Zhang, Guoying [3 ]
机构
[1] Univ Washington, Foster Sch Business, Seattle, WA 98195 USA
[2] Univ Texas Dallas, Jindal Sch Management, Richardson, TX 75080 USA
[3] Midwestern State Univ, Dillard Coll Business, Wichita Falls, TX 76308 USA
关键词
security; vulnerability; patching; patching policy; exploitation cost; setup cost; disruption cost; SOFTWARE; IMPACT;
D O I
10.1287/ijoc.2014.0638
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Effective patch management is critical to ensure the security of information systems that modern organizations count on today. Facing numerous patch releases from vendors, an information technology (IT) manager must weigh the costs of frequent patching against the security risks that can arise from delays in patch application. To this end, we develop a rigorous quantitative framework to analyze and compare several patching policies that are of practical interest. Our analyses of pure policies-policies that rely on a single metric such as elapsed time or patch severity level-show that certain policies are never optimal and no single policy may fit all information systems uniformly well. Depending on the context parameters, particularly the setup and business disruption costs for patching, either a time-based approach or an approach based on the cumulative severity level may be effective. To develop a more complete guideline for policy selection, we decipher hybrid policies that combine multiple metrics. Finally, we conduct extensive numerical experiments to verify the robustness of our analytical results. Overall, our paper establishes a comprehensive framework for analyzing various patching policies and furnishes useful insights for IT managers.
引用
收藏
页码:462 / 477
页数:16
相关论文
共 28 条
[1]   Why information security is hard - An economic perspective [J].
Anderson, R .
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, :358-365
[2]  
Andress M, 2003, NETWORKWORLD 0303
[3]  
[Anonymous], 2007, 1 FORUM INCIDENT RES
[4]  
[Anonymous], 1998, Fundamentals of queueing theory
[5]   Research note - Sell first, fix later: Impact of patching on software quality [J].
Arora, A ;
Caulkins, JP ;
Telang, R .
MANAGEMENT SCIENCE, 2006, 52 (03) :465-471
[6]   Optimal policy for software vulnerability disclosure [J].
Arora, Ashish ;
Telang, Rahul ;
Xu, Hao .
MANAGEMENT SCIENCE, 2008, 54 (04) :642-656
[7]   An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure [J].
Arora, Ashish ;
Krishnan, Ramayya ;
Telang, Rahul ;
Yang, Yubao .
INFORMATION SYSTEMS RESEARCH, 2010, 21 (01) :115-132
[8]   Cloud Implications on Software Network Structure and Security Risks [J].
August, Terrence ;
Niculescu, Marius Florin ;
Shin, Hyoduk .
INFORMATION SYSTEMS RESEARCH, 2014, 25 (03) :489-510
[9]   Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments [J].
August, Terrence ;
Tunca, Tunay I. .
MANAGEMENT SCIENCE, 2011, 57 (05) :934-959
[10]  
Beattie S, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XVI), P233