Security Patch Management
A procedure for managing the identification, evaluation, testing, and deployment of security patches across all organisational systems and devices.
Purpose
To reduce the organisation exposure to security vulnerabilities by ensuring that security patches are identified, tested, and deployed in a timely and controlled manner across all IT assets.
Scope
Covers all security patches for operating systems, applications, firmware, and network devices across on-premises and cloud environments.
Prerequisites
- Vulnerability scanning and patch management tools deployed
- Defined patching schedule and maintenance windows
- Test environment for patch validation
- Change management process for production deployments
Step-by-Step Procedure
Identify Available Security Patches
Monitor vendor security bulletins, vulnerability databases, and patch management systems for newly released security patches.
- 1.1Review vendor security bulletins and advisories
- 1.2Check the patch management system for newly available patches
- 1.3Cross-reference with vulnerability scan results to identify applicable patches
Assess and Prioritise Patches
Evaluate the severity and applicability of each patch to the organisation environment and prioritise based on risk.
- 2.1Assess the severity rating of each patch using the common vulnerability scoring system
- 2.2Determine which systems in the environment are affected
- 2.3Prioritise critical and high-severity patches for expedited deployment
- Patches addressing actively exploited vulnerabilities should be treated as emergencies
Test Patches
Deploy patches to a test environment and verify compatibility and stability before production deployment.
- 3.1Deploy patches to the test environment
- 3.2Verify that patched systems function correctly
- 3.3Test critical business applications for compatibility issues
Obtain Deployment Approval
Submit the patch deployment plan through the change management process and obtain approval.
- 4.1Prepare the change request with patch details, test results, and deployment plan
- 4.2Include the rollback procedure in case of issues
- 4.3Obtain approval from the change advisory board or designated approver
Deploy to Production
Roll out the approved patches to production systems during the scheduled maintenance window.
- 5.1Notify users of the patching schedule and any expected disruption
- 5.2Deploy patches using the patch management system
- 5.3Monitor deployment progress and address any installation failures
Verify Patch Deployment
Confirm that patches have been successfully applied to all target systems and that no issues have been introduced.
- 6.1Run a post-deployment vulnerability scan to confirm patches are applied
- 6.2Check system health and application functionality post-patching
- 6.3Follow up on any systems that failed to patch successfully
Report and Document
Document the patching results and update the patch compliance report for management review.
- 7.1Record patching results including success rate and exceptions
- 7.2Update the patch compliance dashboard
- 7.3Report the patch status to IT management
Quality Checkpoints
Common Mistakes to Avoid
Expected Outcomes
Percentage of systems with all critical security patches applied within the defined timeframe.
Average time from patch release to deployment across the environment, measuring patching speed.
Frequently Asked Questions
How quickly should critical security patches be deployed?
Critical security patches, especially for actively exploited vulnerabilities, should be deployed within 48 to 72 hours. Standard security patches should be deployed within the regular monthly patching cycle.
Are all systems patched on the same schedule?
Servers, workstations, and network devices may have different patching schedules based on their role, criticality, and maintenance windows. The patching schedule is designed to balance security with business continuity.
What if a patch causes problems in the test environment?
If a patch causes issues in testing, the vendor should be contacted for guidance. The patch may need to be deferred until a fix is available, with compensating security controls applied in the interim.
Want this customised for YOUR business?
We'll tailor every step to your exact operations, tools, and team structure.