<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-au/blog/authors/abdul-azize/rss" /><link>https://www.ivanti.com/en-au/blog/authors/abdul-azize</link><item><guid isPermaLink="false">9d782f8b-1ed3-4978-9b6d-5d8eefa418db</guid><link>https://www.ivanti.com/en-au/blog/disp-compliance-and-the-defence-industry-supply-chain</link><atom:author><atom:name>Abdul Azize</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/abdul-azize</atom:uri></atom:author><category>Security</category><title>DISP Compliance and the Defence Industry Supply Chain</title><description>&lt;p&gt;Any organisation that is already or wants to be part of the Australian Department of Defence supply chain needs to be a member of the Defence Industry Security Program (DISP).&lt;/p&gt;

&lt;h2&gt;What is DISP?&lt;/h2&gt;

&lt;p&gt;The DISP is essentially a security vetting for Australian businesses. The DISP is managed by the Defence Industry Security Office (DISO) and DISO supports Australian businesses to understand and meet their security obligations when engaging in Defence projects, contracts and tenders.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“Whether you are an Australian business currently working with Defence or seeking to partner with us, we all have an obligation to contribute to the security of our people, information and assets.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;There are many things Australian businesses can do to minimise security risks and raise their levels of security protection across the security categories of governance, personnel security, physical security, information and cyber security.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Instrumental to this is membership of the Defence Industry Security Program (DISP).”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Defence Industry Security Office&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;DISP membership is extremely important to many different business sectors. Whether it is higher education, manufacturing, transport, consulting, managed services or construction. If you’re looking to work in the Australian Department of Defence supply chain, or already are, then membership to the DISP is essential to ensure the protection of Defence and its assets.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;The important bit&lt;/u&gt;, failure to gain membership will preclude organisations from lucrative federal contracts and have a financial impact on them.&lt;/p&gt;

&lt;h2&gt;The Australian Signals Directorate Top 4&lt;/h2&gt;

&lt;p&gt;In recent years within the cyber security sector in Australia, most of the discussion has revolved around the Australian Cyber Security Centre (ACSC) Essential 8. Although now a lot of the industry focus has shifted back to what the Essential 8 replaced, the Australian Signals Directorate (ASD) Top 4 some new changes have been put in place for DISP membership requirement. One of the membership requirements mandates the enforcement of the original ASD Top 4.&lt;/p&gt;

&lt;p&gt;The ASD Top 4 includes:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Application Whitelisting (Now referred to as Application Control)&lt;/li&gt;
	&lt;li&gt;Patching applications&lt;/li&gt;
	&lt;li&gt;Patching operating systems&lt;/li&gt;
	&lt;li&gt;Restricting administrative privileges&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;ACSC data shows organisations can prevent up to 85% of Windows intrusion threats by implementing the ASD Top 4 so whether you’re looking at DISP membership or not it’s a worthwhile and important undertaking for an organisation.&lt;/p&gt;

&lt;h2&gt;Help with implementing the Top 4 controls&lt;/h2&gt;

&lt;p&gt;At Ivanti we’ve always focused on the Top 4 controls, our security products are used by organisations of all sizes across multiple business sectors in Australia.&lt;/p&gt;

&lt;p&gt;While most organisations will already have an operating system patching process in place, the remaining three controls are all seen as a rather difficult, manual, and time-consuming controls to implement, it doesn’t have to be that way!&lt;/p&gt;

&lt;p&gt;Ivanti Application Control can make whitelisting and restricting admin privileges very simple and quick. Allowing you to go from auditing to enforcement with a very fast return on investment and minimal administration overheads.&lt;/p&gt;

&lt;p&gt;Ivanti has the largest catalogue of patch content for third-party apps and our patching products are securing over 180 million endpoints globally.&lt;/p&gt;

&lt;p&gt;If an organisation is already using Microsoft Endpoint Manager to manage and patch their endpoints Ivanti can plug right into it with Ivanti Patch for MEM adding support for our 3&lt;sup&gt;rd&lt;/sup&gt; patching catalogue.&lt;/p&gt;

&lt;p&gt;If a mechanism for operating system patching isn’t in place, then Ivanti Security Controls can be used to cover both the applications and operating systems.&lt;/p&gt;

&lt;p&gt;For more information on how Ivanti can help you with the Top 4 and Essential 8 you can view a video of our Essential 8 approach here: &lt;a href="https://app.goconsensus.com/play/56988ac6" target="_blank" rel="noopener"&gt;Ivanti ACSC Essential 8&lt;/a&gt; or gain an overview on how to &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/use-cases/comply-with-the-australian-cyber-security-centre" target="_blank"&gt;comply with the ACSC Essential 8 here&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Need DISP Compliance ASAP?&lt;/h2&gt;

&lt;p&gt;If you need to become compliant with the DISP and need to get those ASD Top 4 security controls in place quickly let us know. We have helped a number of organisations in the last 6 months who have needed quick compliance for a project or tender, and we have been able to support them implementing the controls efficiently, effectively and without user disruption.&lt;/p&gt;

&lt;h2&gt;Some handy references:&lt;/h2&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="https://www1.defence.gov.au/security/industry" target="_blank" rel="noopener"&gt;https://www1.defence.gov.au/security/industry&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www1.defence.gov.au/security/industry/eligibility#Mandatory" target="_blank" rel="noopener"&gt;https://www1.defence.gov.au/security/industry/eligibility#Mandatory&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://ext.defence.gov.au/sites/default/files/media/DISP-Membership-Requirements-Checklist-D2_0.pdf" target="_blank" rel="noopener"&gt;https://ext.defence.gov.au/sites/default/files/media/DISP-Membership-Requirements-Checklist-D2_0.pdf&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-au/en-au/en-au/use-cases/comply-with-the-australian-cyber-security-centre" target="_blank"&gt;https://www.ivanti.com.au/solutions/needs/comply-with-the-australian-cyber-security-centre&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-au/lp/security/assets/s1/the-acsc-essential-8" target="_blank"&gt;https://www.ivanti.com.au/lp/security/assets/s1/wp-the-ascs-essential-8&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-au/products/patch-for-configuration-manager" target="_blank"&gt;https://www.ivanti.com.au/products/patch-management-for-mem&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-au/products/security-controls" target="_blank"&gt;https://www.ivanti.com.au/products/security-controls&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://app.goconsensus.com/play/56988ac6" target="_blank" rel="noopener"&gt;https://app.goconsensus.com/play/56988ac6&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;</description><pubDate>Thu, 26 Aug 2021 15:20:18 Z</pubDate></item><item><guid isPermaLink="false">d76fc5ad-893c-4317-a690-c6538788b358</guid><link>https://www.ivanti.com/en-au/blog/can-you-patch-a-server</link><atom:author><atom:name>Abdul Azize</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/abdul-azize</atom:uri></atom:author><category>Security</category><title>You Can Fly Round the World in 48 Hours but Can You Patch a Server?</title><description>&lt;p&gt;It is becoming increasingly more difficult for organisations to keep up with the ever-growing security patching requirements. More stringent guidelines are being introduced, such as the &lt;a href="https://www.cyber.gov.au/acsc/view-all-content/publications/essential-eight-maturity-model" target="_blank" rel="noopener"&gt;Australian Cyber Security Centre (ACSC) Essential 8&lt;/a&gt;. To meet the highest level of maturity of the essential 8, an organisation must patch and secure critical security vulnerabilities within 48 hours of the release of the patch or discovery of the vulnerability.&lt;/p&gt;

&lt;p&gt;The 48-hour turnaround time can be difficult to meet due to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Ineffective deployment methods;&lt;/li&gt;
	&lt;li&gt;Red tape with process; and&lt;/li&gt;
	&lt;li&gt;Lack of adequate reporting.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;What happens in the wild?&lt;/h2&gt;

&lt;p&gt;From my personal experience with large organisations the complexity of the environments makes patching security vulnerabilities within a 48-hour time frame difficult. A combination of the complex environments, manual processes and stakeholder engagement inhibit the ability to make the time frame.&lt;/p&gt;

&lt;p&gt;On the flip side in organisations that manage to meet this requirement tend to skip over the required processes. An outcome of this typically a lack of reporting and verification of the patching being completed.&lt;/p&gt;

&lt;h2&gt;What’s the best approach?&lt;/h2&gt;

&lt;p&gt;With those issues in mind it’s obvious a very mature streamlined and automated approach is required. An approach that can tie in the deployment method, the required processes and reporting on the results.&lt;/p&gt;

&lt;p&gt;The flow on effect of building such a solution gives the added benefit of further streamlining standard patching. Increasing the confidence with stake holders and allowing for resources to be better utilised compared to the current manual resource driven patching processes many organisations still utilise.&lt;/p&gt;

&lt;h2&gt;How can Ivanti help?&lt;/h2&gt;

&lt;p&gt;A good place to start is Ivanti Security Controls (ISEC). ISEC allows you to patch both operating system as well applications for Windows and Linux. ISEC also allows the choice of agent or agentless patching, meaning you can avoid adding yet another security agent to the endpoints. Furthermore, ISEC also has the capability to take the output of vulnerability scanners allowing you to automatically convert a list of Common Vulnerabilities and Exposures (CVE) directly into a list of patches. Ivantis CVE to Patch technology is a great time saver you no longer have to have resources completing repetitive tasks to produce the patch list.&lt;/p&gt;

&lt;p&gt;For the 48 hours patching use case pairing ISEC with Ivanti Automation is a must. The automation platform can control every step based on the defined processes of an organisation. This can be achieved using the Ivanti Automation Connectors allowing Automation to tap into ISEC, Service Management platforms (such as Ivanti Service Manager) as well as the Automation platform itself performing required health checks that are part of the process itself.&lt;/p&gt;

&lt;p&gt;The final part of the puzzle is reporting and the tool for that is Ivanti Xtraction. Xtraction is a real-time intelligence platform. It allows you to build reports from multiple sources across vendors into easy to understand dashboards. Xtraction can be used to report on the patching status across an organisation allowing for easy single pane of glass view for the compliance status.&lt;/p&gt;

&lt;h2&gt;Putting it all together&lt;/h2&gt;

&lt;p&gt;Bringing all these pieces together is the real art behind successfully creating a process to meet the 48 hours critical patching requirement. From our experiences here at Ivanti a simple strategy utilising this approach would typically look like this:&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/09/anzblog.png"&gt;&lt;/p&gt;

&lt;p&gt;Underpinning all of this with Xtraction, allowing a live dashboard view of the whole process to be monitored.&lt;/p&gt;

&lt;p&gt;The Ivanti approach allows for one vendor to cover this process, from the patch management, service management, reporting and automation. Also, for organisations that already have partial coverage Ivanti can plug the gaps to bring it all together.&lt;/p&gt;

&lt;h2&gt;What next?&lt;/h2&gt;

&lt;p&gt;Ivanti have a nice short demonstration of all aspects of the automated patching and reporting which can be found &lt;a href="https://ivanti.showpad.com/share/2ptsL7783KW66PNQ6spwr" target="_blank" rel="noopener"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;If you would like to have a chat regarding automated patching you can reach out to us from our &lt;a href="https://www.ivanti.com/en-au/" target="_blank"&gt;homepage&lt;/a&gt;.&lt;/p&gt;

&lt;div&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><pubDate>Mon, 12 Oct 2020 13:58:53 Z</pubDate></item></channel></rss>