<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Thoughts on Patching for Zero Day in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81375#M1326</link>
    <description>&lt;P&gt;For things like OS and infrastructure patches I fully agree.&amp;nbsp; If you have a test environment feel free to start testing the zero day there immediately, but anything that needs to be up should wait at least a few days, and then start small with your testing. Most of these zero days would need more access to your environment and would require some level of expertise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now zero days for things like browsers are a different story.&amp;nbsp; The level of exposure to things outside of your control make them a little more critical to start updating on endpoints that are browsing the web.&amp;nbsp; My feeling is that browsers and similar software should be patched as soon as possible, and in some cases, same day as zero day is announced the rollout should be started.&amp;nbsp; Now I would put in the caveat of, start patching your preplanned test users first and let the updates bake for a bit before rolling out across your entire environment, but I would not take as much time to get those patches out as I would for patches on mission critical equipment.&lt;/P&gt;</description>
    <pubDate>Thu, 12 Jun 2025 16:07:23 GMT</pubDate>
    <dc:creator>Brewdawg</dc:creator>
    <dc:date>2025-06-12T16:07:23Z</dc:date>
    <item>
      <title>Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81373#M1325</link>
      <description>&lt;P&gt;I'm just interested in feedback from people here. My background is sysadmin and I've had MANY people come screaming at me over the last couple of decades when a Zero day comes out to cancel all my plans and suddenly patch the entire infrastructure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've had a few arguments with cybersecurity people who haven't worked sysadmin or similar who insist that the patches need to be installed STRAIGHT AWAY and scare the C-Suite about it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, &amp;nbsp;I've seen enough times with Microsoft especially, but also VMWare back in the day where an entire infrastructure was taken down by a bad patch. And don't say - you should test it first, there are PLENTY of clients out there with no test environments and some of these patches that went out didn't display a problem until after reboot or even a couple of days later.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm a BIG fan of letting someone else take the risk first. Definitely DON't do it on a Friday night &amp;amp; leave at least 48 hours before even thinking about patching a 0 day, as the patches are usually rushed, badly written &amp;amp; VERY likely to be faulty.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2025 14:57:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81373#M1325</guid>
      <dc:creator>vishybear</dc:creator>
      <dc:date>2025-06-12T14:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81375#M1326</link>
      <description>&lt;P&gt;For things like OS and infrastructure patches I fully agree.&amp;nbsp; If you have a test environment feel free to start testing the zero day there immediately, but anything that needs to be up should wait at least a few days, and then start small with your testing. Most of these zero days would need more access to your environment and would require some level of expertise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now zero days for things like browsers are a different story.&amp;nbsp; The level of exposure to things outside of your control make them a little more critical to start updating on endpoints that are browsing the web.&amp;nbsp; My feeling is that browsers and similar software should be patched as soon as possible, and in some cases, same day as zero day is announced the rollout should be started.&amp;nbsp; Now I would put in the caveat of, start patching your preplanned test users first and let the updates bake for a bit before rolling out across your entire environment, but I would not take as much time to get those patches out as I would for patches on mission critical equipment.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2025 16:07:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81375#M1326</guid>
      <dc:creator>Brewdawg</dc:creator>
      <dc:date>2025-06-12T16:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81382#M1327</link>
      <description>&lt;P&gt;This is where update rings come into play. Whatever you are using to push the updates out should have this feature, and if it doesn't you need to find something that does. It's simply pushing the update to large and larger groups of users on a set schedule. Your first ring would probably be a core set of users, including IT, os if there is a problem with an update they will know what going on and you can pause updates going out to anyone lease before is it addressed. With things I have seen with breaches it seems less to be about the 0 day and things being exploited what a patch has been out for a year and was just never applied...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2025 20:38:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81382#M1327</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2025-06-12T20:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81386#M1328</link>
      <description>Not every zero-day is automatically exploitable in every environment. Many require specific conditions, privileges, or exposed services. Blindly pushing patches without assessing applicability or risk often creates more problems than it solves.&lt;BR /&gt;Triage:&lt;BR /&gt;- Is it being exploited in the wild?&lt;BR /&gt;- Is your stack affected (OS version, exposed service)?&lt;BR /&gt;- Can it be mitigated temporarily (e.g., disabling a feature)?&lt;BR /&gt;&lt;BR /&gt;Consider compensating controls:&lt;BR /&gt;- WAF rules, network segmentation, ACL hardening—these can buy you time while patch quality matures.&lt;BR /&gt;&lt;BR /&gt;The key lies in making informed decisions through collaboration, prioritizing based on the specific environment, business impact, and existing security controls.</description>
      <pubDate>Fri, 13 Jun 2025 12:50:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81386#M1328</guid>
      <dc:creator>akkem</dc:creator>
      <dc:date>2025-06-13T12:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81398#M1329</link>
      <description>&lt;P&gt;To an extent, they are right.&amp;nbsp; One should generally keep equipment patched.&amp;nbsp; But like any advise, it needs to be moderated with a dose of reality.&amp;nbsp;There is risk to patching; there is risk to not patching.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is it worth risking a &lt;A href="https://en.wikipedia.org/wiki/2024_CrowdStrike-related_IT_outages" target="_blank" rel="noopener"&gt;Crowdstrike event&lt;/A&gt; by applying patches to all devices immediately and depending solely on automated testing?&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Timing can matter. I.e. can it wait till lunch/morning/off-shift?&amp;nbsp; Sometimes, "right now" will shut down just-in-time manufacturing, resulting in burdensome contractual penalties due to the customer.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;We once had an incident that required shutting down most of our entire corporate network for a few days.&amp;nbsp; The fix was to apply a patch that had come out a week earlier.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The goal is to find the middle ground where everyone can sleep at night and everyone is equally unhappy with the plan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a schedule stating how many "wait days" before each wave gets updates (as&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1542574691"&gt;@JKWiniger&lt;/a&gt;&amp;nbsp;mentions), including escalation based on CVSS score.&amp;nbsp; And, if there is evidence &lt;STRONG&gt;we&lt;/STRONG&gt; are under attack the schedule escalates further.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jun 2025 19:34:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81398#M1329</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-06-13T19:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81402#M1330</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/111970903"&gt;@akkem&lt;/a&gt;&amp;nbsp;But you seem to miss one thing... you don't know if a 0 day is being exploited until it's too late! So while many things are not actively exploited you need to act as if they all are. Even if 1 in 100 get exploited I would much rather apply 100 patched than not patch for that 1 that matters...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jun 2025 23:19:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81402#M1330</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2025-06-13T23:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81407#M1331</link>
      <description>&lt;P&gt;I think that my issue is that I've seen more patches go wrong than exploits .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As someone who's done the 2 or 3 days in a row in the office and the 6am finishes because someone else did something stupid while still being made redundant or having my contract not renewed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I'm at the point in my career where I'd rather take a 99% risk than cancel a plan with friends.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do genuinely dislike being expected to cancel plans or stay late with no extra pay by people who've never done it or have never worked sysadmin. Especially if the 0 day is on a product I didn't want to buy in the first place or a PM or cybersecurity guy ignored advice I gave 6 months before. Usually a PM. ;o)&lt;/P&gt;</description>
      <pubDate>Sat, 14 Jun 2025 12:32:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81407#M1331</guid>
      <dc:creator>vishybear</dc:creator>
      <dc:date>2025-06-14T12:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81408#M1332</link>
      <description>&lt;P&gt;Thats if you have testing environments. To be fair if &amp;nbsp;a security team came to me at 4:55 expecting me to cancel plans, I wouldn't even roll out testing patchers unless I could press a button and leave the office and worry about it in the morning.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I asked this question on the r/sysadmin reddit &amp;amp; there is definitely a split between the junior guys who haven't been mentally destroyed yet and the more senior guys like me that have been screwed over by corporate decisions repeatedly ;o)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm now a strict, no overtime without 1 month notice and double time, regardless of risk.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Jun 2025 12:35:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81408#M1332</guid>
      <dc:creator>vishybear</dc:creator>
      <dc:date>2025-06-14T12:35:59Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81410#M1333</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1610895209"&gt;@vishybear&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I think that my issue is that I've seen more patches go wrong than exploits .&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The missing bit is not knowing how many exploits were foiled by patching prior to exploit.&amp;nbsp; Part of that may be because success does not create headlines.&amp;nbsp; The classic example being&amp;nbsp;fear of flying due to airplane accidents despite the fact that all objective measurements show driving has more fatalities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;I do genuinely dislike being expected to cancel plans or stay late with no extra pay by people who've never done it or have never worked sysadmin.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;You might check your local labor laws regarding working "off the clock".&amp;nbsp; But that is just a symptom. The true problem is not aligning staffing levels with requirements.&amp;nbsp; If the organization requires 1-hour response, the organization needs to staff for 1-hour response.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1610895209"&gt;@vishybear&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;insist that the patches need to be installed STRAIGHT AWAY ... [v.s.]...&lt;SPAN&gt;&amp;nbsp;letting someone else take the risk first.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Both of these are immature positions. The mature position realizes this is not a binary choice. Notable to me is that all those advising a layered approach are CISSPs, indicating 5+ years demonstrable security experience, often including sysadmin work at least for their own boxes and an ability to understand the management perspective.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Back to the tiers/waves, a "test environment" is not mandatory.&amp;nbsp; &amp;nbsp;One possible approach would be something like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Everything "security" owns, plus all the I.T. laptops, using the "eat your own dog food" theory, coupled with not wanting devices involved in recovery to fail at the same time as production devices.&lt;/LI&gt;&lt;LI&gt;All non-production devices ("test", "development", or "quality assurance").&lt;/LI&gt;&lt;LI&gt;Any device identified as tolerable of 24 hours+ downtime, including the standby members of clusters.&lt;/LI&gt;&lt;LI&gt;Any device "publicly exposed" (e.g. public web servers).&lt;/LI&gt;&lt;LI&gt;Anything not directly involved with producing the company's product (e.g. payroll, scheduling, non-I.T. laptops)&lt;/LI&gt;&lt;LI&gt;And lastly, the manufacturing equipment.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Jun 2025 16:59:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81410#M1333</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2025-06-14T16:59:44Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81474#M1334</link>
      <description>&lt;P&gt;We take a mix and match approach focusing on all pertinent risks.&amp;nbsp; Prioritising based on CVSS score and how exposed particular systems are.&amp;nbsp; You'd test in non prod if feasible, but if not, take one of two approaches to derisk deployment; wait a few days or start patching less critical systems first and monitor for ill effects.&amp;nbsp; Once you're happy you can accelerate the deployment.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jun 2025 10:13:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/81474#M1334</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2025-06-17T10:13:45Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on Patching for Zero Day</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/82873#M1344</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1610895209"&gt;@vishybear&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;However, &amp;nbsp;I've seen enough times with Microsoft especially, but also VMWare back in the day where an entire infrastructure was taken down by a bad patch.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Here's a SUG (sweeping unsupported generalization): The patch tends to precede the exploit, often by months. This means that you don't have to be the first adopter of a patch, but you should be in that second wave or so (once the world hasn't collapsed).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SUG #2, the severity of some vulnerability or exposure often is only quantified after the exploit occurs. While we try our best, identifying the severity of a flaw is notoriously "not good." How often is the corporate line something like "it's highly unlikely" that a flaw could be exploited? Then, lo and behold, someone does it in a way that no one envisioned (often because it gets combined with just good old social engineering). By the same token, you also get the panicked headlines for vulnerabilities that likely will never be exploited. This is long way of saying, triaging patching (e.g., rush the "critical" ones) isn't reliable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, a lot of this comes down to starting with your footprint. Keeping things simple makes patching simple. That's on both a personal level and an enterprise one, which today is one in the same because everyone uses personal devices (and habits) to access enterprise resources. Keep your systems up to date, but also keep those systems as lean as you can.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 22:38:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Thoughts-on-Patching-for-Zero-Day/m-p/82873#M1344</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2025-08-05T22:38:06Z</dc:date>
    </item>
  </channel>
</rss>

