My 5 learnings from the CrowdStrike update
Jonas R. Linden, M.Sc. MBA
Technical Executive | Ex. Meta | Cybersecurity | Engineering Leadership, Agile, SAFe | AI Founder | Lecturer | Security+
In light of the issues with the CrowdStrike Falcon update, I am reminded of a time about 5 years ago at Bose Corporation .
At the time, there were about 300,000 devices regularly polling the Bose Cloud for new updates. These updates were tested internally to ensure that the risk of the worst-case scenario of locking up or bricking customers’ devices would be minimized.
The only way for a customer to recover from a bad update was to reset the device manually.
Carbon Black used a similar Cloud/agent-based architecture as CrowdStrike , and at CarbonBlack new updates were released routinely using a staged release strategy. That is, instead of updating all customers at once, each stage was a subset of the install base and updates continued to more customers only after validating that things worked.
If there is an issue with a software update and it is caught in the staged release process, the benefit is that the impact of the issue is minimized.?
At Bose, it was not easy to convince the leaders to enhance the release process:
领英推荐
I got buy-in from an engineer for a proof of concept. After enhancing the update process metrics, we ran a test to prove that staged release process worked. The enhanced metrics helped us validate that updates had been applied successfully.
With this data, I was able to get support for implementing staged releases, which minimized the risks associated with new updates.
Here are my 5 learnings from the CrowdStrike update:
Disclaimer: This post is only intended to share learnings based on my own experience. I have the utmost respect and admiration for all the companies referenced.