Patch Management
A systematic process for identifying, testing, approving, and deploying software updates (patches) to address security vulnerabilities in IT systems.
Patch management is the structured process by which organizations identify, assess, test, and deploy software updates (patches) for their IT systems—with the goal of closing known security vulnerabilities before attackers can exploit them.
The Patch Management Process
- Detection: Automated monitoring for new patches (vendor notifications, CVE feeds, WSUS, SCCM, MDM)
- Assessment: Is the patch relevant? Which systems are affected? Check CVSS score and EPSS probability
- Testing: Deploy patch in test/staging environment; verify functionality and compatibility
- Approval: Formal change management process (CAB approval for critical systems)
- Deployment: Roll out to production systems—staggered by risk class
- Verification: Confirm successful installation, re-scan
Patch Prioritization by SLA
Recommended SLAs based on CVSS + EPSS:
- Critical + actively exploited (KEV): 24–48 hours
- Critical (CVSS ≥ 9.0): 7 days
- High (CVSS 7.0–8.9): 14 days
- Medium (CVSS 4.0–6.9): 30 days
- Low (CVSS < 4.0): 90 days
Patch Management in Practice
Challenges:
- Dependencies: Patch A breaks application B
- Availability: Production systems cannot simply be restarted
- End-of-life software: No more vendor support, no official patches
- Complexity: Thousands of systems and applications in larger enterprises
Tools:
- Microsoft: WSUS, SCCM, Windows Update for Business, Intune
- Linux: Ansible, Chef, Puppet, apt/yum automation
- Enterprise: Qualys VMDR, Tenable, Ivanti Patch Management, ManageEngine
Compliance Relevance
BSI IT-Grundschutz OPS.1.1.3 explicitly requires a patch and change management process.
ISO 27001 A.12.6.1 requires timely management of technical vulnerabilities.
NIS2 Art. 21 mandates vulnerability and patch management as part of risk management.
Key Metric
Patch Compliance Rate: Percentage of systems patched within the SLA timeframe. Target: >95% for critical and highly critical vulnerabilities.