Vulnerability and Patch Management Policy
Vulnerability and Patch Management Policy
1. Description
Software and firmware vulnerabilities must be constantly managed and mitigated over time as new
vulnerabilities are discovered. The <COMPANY-XYZ> Information Technology (IT) department is
responsible for tracking, remediating, and reporting on vulnerability management for the organization’s
information technology assets. This policy addresses the following cybersecurity domains defined by the
Cybersecurity Maturity Model Certification (CMMC): Maintenance; System and Information Integrity.
2. Purpose
The purpose of the policy is to establish a common understanding of vulnerabilities and patch
management, guide the prioritization of remediation efforts, and provide timelines for each activity. This
policy also describes security requirements for performing information systems maintenance: patching
and vulnerability remediation falls into the category of maintenance, as well as activities like repairing or
replacing systems hardware.
3. Scope
This policy applies to <COMPANY-XYZ> information systems.
a) All software and systems used by <COMPANY-XYZ> for production shall be kept updated to a
version that is supported by the vendor. Support means the vendor provides guidance and updates
to resolve discovered vulnerabilities and functionality issues.
b) Systems that are scheduled for end-of-support by the vendor will be replaced prior to end-of-
support.
This document has been provided to our client for use internal to their Page 1 of 5
legal entity and is not to be redistributed. This document may not be
disclosed to third parties without an executed non-disclosure. agreement.
Form name: Vulnerability and Patch Management Policy Form owner: <President/CIO>
Version: 1.0 Last review and approval date: MM/DD/YYYY
c) If a system is no longer supported (known as a “legacy” system), and cannot be replaced with a
supported version, it shall be identified and reviewed monthly by the Change Approval Board (CAB)
to determine a course of action.
a) Every end-user device managed by the <COMPANY-XYZ> IT department shall be registered with a
patch management system prior to entering production use.
b) Patch management systems shall perform the following functions:
Report of patches that have been applied to each device
Report of relevant patches that have not been applied to each device
Last check-in date for each device
Ability to trigger the installation of missing patches
a) All security issues that are discovered shall be mitigated based upon the following risk levels. These
risk levels are assessed using the OWASP Risk Rating Methodology.
High – Any high-risk issue must be fixed immediately, or other mitigation strategies must be
put in place to limit exposure before deployment. Applications with high-risk issues are
subject to being taken off-line or denied release into the production environment.
Medium – Medium-risk issues should be reviewed to determine what is required to mitigate
and scheduled accordingly. Applications with medium risk issues may be taken off-line or
denied release into the production environment based on the number of issues and if
multiple issues increase the risk to an unacceptable level. Issues should be fixed in routine
patch releases unless other mitigation strategies will limit exposure.
Low – Issue should be reviewed to determine what is required to correct the issue and
scheduled accordingly.
This document has been provided to our client for use internal to their Page 2 of 5
legal entity and is not to be redistributed. This document may not be
disclosed to third parties without an executed non-disclosure. agreement.
Form name: Vulnerability and Patch Management Policy Form owner: <President/CIO>
Version: 1.0 Last review and approval date: MM/DD/YYYY
a) Prior to removing equipment offsite for maintenance, disposal, or repurpose, the <COMPANY-XYZ>
IT department is responsible for sanitizing or destroying all sensitive data on the device. Sanitization
will be performed using methods compliant with DoD 5220.22-M (if no CUI exists on device) or NIST
Special Publication 800-88 (if CUI exists on device).
b) Multi-factor authentication is required to establish non-local maintenance sessions across external
network connections. When maintenance is complete, promptly disconnect the network
connection.
c) <COMPANY-XYZ> information systems maintenance may only be performed by personnel who have
been granted privileged access through the Access Management process. If systems maintenance
must be performed by third parties (who have not been granted access to <COMPANY-XYZ>
Information Systems) they must be supervised by a <COMPANY-XYZ> privileged user. When
possible, the <COMPANY-XYZ> privileged user shall perform the action themselves with guidance
from the third party.
d) Tools used to perform maintenance must be tracked using appropriate configuration, change,
incident, or service request process. Tools for maintenance shall be updated and patched like other
<COMPANY-XYZ> systems and software. Tools and mechanisms provided by third party
maintenance personnel shall be checked for malware and verified to be from a reputable source
prior to use on <COMPANY-XYZ> information systems.
This document has been provided to our client for use internal to their Page 3 of 5
legal entity and is not to be redistributed. This document may not be
disclosed to third parties without an executed non-disclosure. agreement.
Form name: Vulnerability and Patch Management Policy Form owner: <President/CIO>
Version: 1.0 Last review and approval date: MM/DD/YYYY
e) Security tools such as vulnerability scanners, antivirus programs and internet security agents must
update their threat intelligence databases daily, or each time the device connects to the Internet.
f) The <COMPANY-XYZ> <CISO> is responsible for oversight of maintenance activities to ensure this
policy is followed.
5. Related Documents
Configuration Management Policy
Risk Assessment Policy
7. Regulatory Guidelines
a) All activities described by this policy must be compliant with the Department of Defense’s
Cybersecurity Maturity Model Certification (CMMC).
9. Authority
The responsible party for this policy is the <CIO>: Name.
The responsible party has authority to implement and enforce this policy within COMPANY-XYZ to
include disciplinary actions for non-compliant employees and contractors. The responsible party must
review this policy and related procedures, agreements, and forms at least annually.
Exceptions to this policy must be granted in writing by the responsible party and will be tracked in the
“COMPANY-XYZ – Policy Exception Tracking” file.
This document has been provided to our client for use internal to their Page 4 of 5
legal entity and is not to be redistributed. This document may not be
disclosed to third parties without an executed non-disclosure. agreement.
Form name: Vulnerability and Patch Management Policy Form owner: <President/CIO>
Version: 1.0 Last review and approval date: MM/DD/YYYY
If you would like additional clarification about the information in this document or believe that this
policy is not being adhered to, please report your concerns to the <CIO> (<email@COMPANY-
XYZ.com>).
The signature should be from an executive in the organization, such as the President or CEO, who is
delegating authority to the CIO to perform these tasks.
Signature X
This document has been provided to our client for use internal to their Page 5 of 5
legal entity and is not to be redistributed. This document may not be
disclosed to third parties without an executed non-disclosure. agreement.