Book traversal links for 3.4.9 Patch Management
3.4.9 Patch Management
No: 43028139 | Date(g): 4/11/2021 | Date(h): 29/3/1443 | Status: In-Force |
Principle
Patch management process should be defined and implemented to ensure up-to-date with latest applicable and relevant patches (i.e. functional or non-functional) are installed in a timely manner to avoid technical issues including security breaches due to existing vulnerabilities in the system.
Control Requirements
- The patch management process should be defined, approved, implemented and communicated by the Member Organizations.
- The effectiveness of the patch management process should be monitored, measured and periodically evaluated.
- All patches should be thoroughly assessed for impact by relevant stakeholders including cyber security before being implemented into the production environment.
- All systems should be periodically scanned or inspected to identify any outdated patches and vulnerabilities in the systems.
- Deployment of patches should follow a formal change management process.
- All patches should be thoroughly tested in a separate test environment prior introducing to the production environment to avoid any compatibility issue with the system and related components.
- Patches should be rolled out to systems and related components systematically.
- Following deployment of patches to the production environment, systems should be monitored for any abnormal behavior and, if such behavior identified should be thoroughly investigated to identify the root cause and fix them properly.
- Patch deployment window (i.e. schedule) should be communicated to business and relevant stakeholders in advance and preferable should be done during non-peak hours and non-freezing periods to avoid any business disruption.
- The external feeds from software vendors or other acknowledged sources should be monitored to identify any new vulnerabilities in the system and to be patched accordingly.