Toll-free in North America

1-833-2READINESS

Everywhere else:

+44 203 633 5432

Patch Patch! You’re Dead.

Greg Lambert
November 1, 2023
2 minutes

There are several vendors and solution providers out now who are providing vulnerability assessments. These (vulnerability) assessments can vary from automated solutions to manual validation but are generally defined as;

A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems.

Wikipedia

When it comes to workstation/server builds and applications a vulnerability assessment usually starts with a CVE number like CVE-2023-34048. A serious (9.8 of out 10 ) security vulnerability in VMWare. Or CVE-202344487 which affects Microsoft core network features. Do you use VMware? Or .NET? WINDOWS?

As of today, there are 7033 CVE records (registered vulnerabilities) linked to Microsoft products. A vulnerability assessment will identify the risks but not offer guidance – prescriptive, detailed guidance on how to mitigate these risks.

Here’s what I think would really help.

Yes, that CVE notice, with a nice description and severity warning AND:

  1. A list of applications that have been affected, including their dependencies (including CVE details)
  2. Build a testing plan for each application based on affected areas.
  3. Create/Stand-up a secure testing environment (online and in Microsoft Azure)
  4. Automatically apply the patch to your latest build or affected applications.
  5. Automated “smoke” tests for each affected application (Install/update/run/uninstall)
  6. Compare the results against an existing platform (previous test runs)
  7. Generate a report on the differences between pre/post update tests.
  8. Generate a deployment plan/schedule for publishing the updated build or affected applications ( all scripted in PowerShell)

Sounds good – Yes. A prescriptive action plan automatically generated. Tuned to my packaging standards, tested against my custom build and ready in minutes.

Readily repeatable for the next CVE vulnerability release. Yes, please

To find out more, try Readiness Unbound for a free 3-month trial.

Greg Lambert

CEO, Product Evangelist
Greg Lambert is the CEO and product evangelist for Application Readiness Inc. Greg is a co-founder of ChangeBASE and has considerable experience with application packaging technology and its deployment.

Planning business modernization projects?

  • Windows 10/11 migration
  • MS server 2022
  • Migration to Azure

Is your application estate ready?

Assurance.

Unbounded.

3 months of patch protection, assessments and dependency reports for your entire portfolio.

  • No cost
  • No limit of applications
  • No software needed
  • No infrastructure required
  • No obligation
Contact us to get started