| ▲ | bumblehean 6 hours ago | ||||||||||||||||||||||||||||
>The thing to do is to monitor your dependencies and their published vulnerabilities, and for critical vulnerabilities to assess whether your product is affect by it. Only then do you need to update that specific dependency right away. The practical problem with this is that many large organizations have a security/infosec team that mandates a "zero CVE" posture for all software. Where I work, if our infosec team's scanner detect a critical vulnerability in any software we use, we have 7 days to update it. If we miss that window we're "out of compliance" which triggers a whole process that no one wants to deal with. The path of least resistance is to update everything as soon as updates are available. Consequences be damned. | |||||||||||||||||||||||||||||
| ▲ | tetha 4 hours ago | parent | next [-] | ||||||||||||||||||||||||||||
I really dislike that approach. We're by now evaluating high-severity CVEs ASAP in a group to figure out if we are affected, and if mitigations apply. Then there is the choice of crash-patching and/or mitigating in parallel, updating fast, or just prioritizing that update more. We had like 1 or 2 crash-patches in the past - Log4Shell was one of them, and blocking an API no matter what in a component was another one. In a lot of other cases, you could easily wait a week or two for directly customer facing things. | |||||||||||||||||||||||||||||
| ▲ | BrenBarn 6 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||
> The practical problem with this is that many large organizations have a security/infosec team that mandates a "zero CVE" posture for all software. The solution is to fire those teams. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||