Optimal Policies for Security Patch Management

被引:29
作者
Dey, Debabrata [1 ]
Lahiri, Atanu [2 ]
Zhang, Guoying [3 ]
机构
[1] Univ Washington, Foster Sch Business, Seattle, WA 98195 USA
[2] Univ Texas Dallas, Jindal Sch Management, Richardson, TX 75080 USA
[3] Midwestern State Univ, Dillard Coll Business, Wichita Falls, TX 76308 USA
关键词
security; vulnerability; patching; patching policy; exploitation cost; setup cost; disruption cost; SOFTWARE; IMPACT;
D O I
10.1287/ijoc.2014.0638
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Effective patch management is critical to ensure the security of information systems that modern organizations count on today. Facing numerous patch releases from vendors, an information technology (IT) manager must weigh the costs of frequent patching against the security risks that can arise from delays in patch application. To this end, we develop a rigorous quantitative framework to analyze and compare several patching policies that are of practical interest. Our analyses of pure policies-policies that rely on a single metric such as elapsed time or patch severity level-show that certain policies are never optimal and no single policy may fit all information systems uniformly well. Depending on the context parameters, particularly the setup and business disruption costs for patching, either a time-based approach or an approach based on the cumulative severity level may be effective. To develop a more complete guideline for policy selection, we decipher hybrid policies that combine multiple metrics. Finally, we conduct extensive numerical experiments to verify the robustness of our analytical results. Overall, our paper establishes a comprehensive framework for analyzing various patching policies and furnishes useful insights for IT managers.
引用
收藏
页码:462 / 477
页数:16
相关论文
共 28 条
[11]  
Beres Y, 2012, IFIP ADV INF COMM TE, V376, P424
[12]  
Brandon J, 2005, PROCESSOR, V27, P17
[13]  
Braverman M, 2005, VIR B C
[14]   Security patch management: Share the burden or share the damage? [J].
Cavusoglu, Hasan ;
Cavusoglu, Huseyin ;
Zhang, Jun .
MANAGEMENT SCIENCE, 2008, 54 (04) :657-670
[15]  
Chan J., 2004, ESSENTIALS PATCH MAN
[16]   WHEN SHOULD ONE STOP TESTING SOFTWARE [J].
DALAL, SR ;
MALLOWS, CL .
JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 1988, 83 (403) :872-879
[17]   Optimal synchronization policies for data warehouses [J].
Dey, Debabrata ;
Zhang, Zhongju ;
De, Prabuddha .
INFORMS JOURNAL ON COMPUTING, 2006, 18 (02) :229-242
[18]   Information security trade-offs and optimal patching policies [J].
Ioannidis, Christos ;
Pym, David ;
Williams, Julian .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2012, 216 (02) :434-444
[19]   LOT SIZES, LEAD TIMES AND IN-PROCESS INVENTORIES [J].
KARMARKAR, US .
MANAGEMENT SCIENCE, 1987, 33 (03) :409-418
[20]   An Economic Analysis of the Software Market with a Risk-Sharing Mechanism [J].
Kim, Byung Cho ;
Chen, Pei-yu ;
Mukhopadhyay, Tridas .
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2009, 14 (02) :7-39