That’s the thing - I manage vulnerabilities by the vulnerabilities themselves, you don’t patch everything just to patch. Well you can, but I would highly recommend against it. You patch what you are truly and functionally vulnerable against first and foremost.
Do you patch a home routers firmware because it fixes a vulnerability in a module you don’t even use, and isn’t active? Do you risk the update not breaking something else? I literally have a Netgear Nighthawk that I can’t login to because it’s web server didn’t restart properly after an update it didn’t need that my brother ran.
These things happen. Patching to patch is a fools errand, in my experience.
My methodology is quite successful as I have a 100% production uptime to report after over 25 years of running IT…not just working in IT, being in charge for 25 years.
I am extremely comfortable in the “threat” of being down, or compromised.
Backups aren’t the key - recovery is the key, and we do that *daily*. And its not through lack of trying - we block over 30,000 direct firewall hack attempts every single day, with about the same number of emails blocked.
I find a multi-faceted perimeter approach is far more successful than worrying about specific targets and software versions used on endpoints. Again, if you’re there on the machine already messing around with a Forticlient, the game is over.
We purposely send out ransomware payloads to our users. We purposely try to spear-phish their emails. We test and train for this stuff as a company.
We’re a public financial company, I am held to higher standards than most can possibly imagine, and we are audited *quarterly* by both internal AND external auditors. Every change is a process. It’s documented. It’s tested. *They’re also vetted for viability i.e. “why are we doing this in the first place?”*
There have been too many IT guys that came through here that are scared of their own shadows…too many to count. The fear of vulnerabilities equates to a fear of the repercussions of the vulnerabilities themselves, which normally manifests in one way: the inability to effectively restore or recover from any given threat. They can’t handle the pressure, talk a big game “yeah, I know esxi, ran a cluster, etc…” ok so I corrupt a VM and watch him squirm while he tries to recover it (with an also purposely corrupted backup) and they’re dead in the water. I hold my guys to a standard so high, more have left than stayed, and the ones who have stayed are the very best alive, I’d bet anything on that.
Sure, we rely on vendors like Fortinet to do their jobs, but they aren’t flawless. Support is sketchy (especially after US-hours), and their devices are quite complicated if you’re not literally trained to administer them, by them. Their IDS/UTM is great, but SSLVPN being deprecated despite them pushing it for decades tells you all you need to know. Talk about vulnerabilities, actually being exploited. I don’t like not having Fortigate expertise onsite, but I do trust the experts in the field who are experts and freelance, knowing support isn’t the greatest at times. Other times, you get a real pro at Fortinet. Unfortunately, it’s too hit-and-miss for my liking…and I can only imagine how the devs are. When the general consensus is to NOT upgrade after a Fortinet release, even for up to a year or more, that’s a problem.
Why would anyone want to run on that code unless you’re looking for specific features? They are *going* to break something, and it’s probably something you need.
For a *Forticlient*, this is a non-issue.
FortiOS is a different story.
Inside-jobs are a non-issue also (unless I’m the one doing it), we are protected from that as well.
Being audited by people who know what they’re doing lay waste to the mentality most IT people have with regards to this stuff.
We teach VMWare, Dell, MS support agents how to fix their own stuff. We were up when Azure, Google, META and AWS was down. Crowdstrike? Ransomware? Hello world, it’s us again, still up and ready for business…
We can pay for licensed Forticlients…but *why*? For the same vulnerabilities that affect the new versions as the old? Nah, it’s better to mitigate the device itself and it’s exposure than trust some vendors developer to code their shit properly - seen too many examples to the contrary. Hell, like I said, SSLVPN isn’t even secure and businesses have been using that as the defacto standard for so long, I wouldn’t listen to anybody running SSLVPN talking to me about security.
I generally don’t trust devs anymore, “they don’t code like they used to” is what I usually think based on what I see, and it’s only getting worse with AI “helping” half-assed devs write code they themselves don’t understand, but push out anyway.
Too much focus on pushing out updates, new features, products and piss-poor QA is what I see, mostly. Very rarely do I see focus on stability, core-functionality, optimization. Apps these days are kludged together to just get the income and they’ll “patch it later” to bring a product they actually released which should have still been in Beta, if not even Alpha. No thanks, I’ll stay back a while while your code is tested more thoroughly in production. MS updates? Those get applied one month after release, mostly. There is a very strong public testing program for those. We patch all the time, but there better be a good reason to do so.
But either way, yeah, I’ll do me all day long. 