Patch Management Policy and Procedure
Patch Management Policy and Procedure
1. Maintain the integrity of network systems and data by applying the latest operating system and application security
updates/patches in a timely manner
2. Establish a baseline methodology and timeframe for patching and confirming patch management compliance
Desktops, laptops, servers, applications, and network devices represent access points to sensitive and confidential
company data, as well as access to technology resources and services. Ensuring updates and patches are distributed
and implemented in a timely manner is essential to maintain system stability and mitigate malware, exploitation, and
security threats.
The processes addressed in this policy affect all company managed systems, including desktops, laptops, servers,
network devices, and applications that connect to the company network.
Responsibility
Responsibility Role
Apply patches IT
Process
1. End-users computers
1. Scan for available patches
2. Download necessary patches from a trusted source (as made available)
3. Schedule deployment
4. Deploy patches
5. Production
1. Patches are approved, deployed, and applied in staging
2. Create a change management request one week before the maintenance date
3. The Customer Support team posts a maintenance window on customers’ portal
4. Deploy patches
5. Communicate extended outages to appropriate teams. If outage goes past window, Customer Support must
communicate it to customers
6. Verify services
Note: The Security team will determine the risk and the relevance of the patch, as well as when the system should be
patched.
Exceptions
1. Systems or applications that cannot be patched to resolve a known vulnerability will have the justification
documented by the device/application owner and the necessary compensating control(s) implemented:
◦ Justification:
▪ No vendor patch available
▪ Patch provided by vendor creates instability within the system; instability outweighs the risk.
◦ Compensating Controls
▪ Network segmentation
▪ Access Control Lists
▪ Intrusion Prevention System
2. Systems that transmit or store protected data and cannot be patched to resolve a known vulnerability will be
brought to the attention of the data owner (typically the IT Security manager, IT Director, and the department
Director) and the necessary compensating control(s) will be implemented.