Avatar of sunhux
sunhux
 asked on

Help review broadcast on systems patching directive

There's growing concern on the timeliness & thoroughness of patching.  I need to
broadcast out an email to the organization's hundreds of IT staff (infra & apps teams)
to emphasize this in a firm (but non-offensive) manner from governance perspective.

Appreciate if anyone can review it's wordings & add on any useful points:

======================================================================

IT teams,

This broadcast is to emphasize the importance of performing timely patch assessment
& obtain downtime where needed to apply patches.  The patches may be security or
non-security (ie for functional fixes) related and meant for appliances/devices (eg: for
network/firewall devices) Operating Systems for servers, workstations and hosts,
applications and firmwares/microCodes.

You are urged to :

1.review regularly the availability of patches for the respective products under your
   care (via the principal's web page and assess if the released patch(es) are applicable

2. assess if the patch is applicable to the products under your support within 3
    working days

3.do test out the patches and seek for approved downtime early so that you have
   sufficient time to test out the patches as thoroughly as possible to minimize the
   risk of patches causing service disruptions

4.maintain a patch register and update it asap after patching has been done

5. As a good practice, apply patches to development, SIT/UAT before rolling
    out to production  environment

Failing to apply patches timely will result in extended exposure to vulnerabilities
and product defects/issues

For your attention and compliance,
IT Security Governance
SecurityVulnerabilitiesWindows OSNetwork Operations

Avatar of undefined
Last Comment
btan

8/22/2022 - Mon
SOLUTION
masnrock

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
ASKER CERTIFIED SOLUTION
btan

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
sunhux

ASKER
There is an existing Patch Management Procedure signed by the heads of the various
IT teams including apps teams, Network, Servers, Ops, IT Security : Audit finds the
procedure inadequate to meet local regulatory requirement and I'm broadcasting it
as a way to supplement this.

Calling individual meetings after the broadcast is what I have in mind.
There's quite a few lapses & audit issued faults (& certainly hold IT Compliance
partially accountable for these lapses).

Thanks for suggesting strong words like "shall" etc
btan

Good there is a regime and it is better if you can even include reference to portal or link on the SOP documented.

The briefing as follow up is good and that can be included as well in the comms.

The use of 'shall' and 'must' are necessities from compliance angle compared to 'should' or 'may'. Discrete timeline is recommended otherwise broad open term like regularly can have different benchmark.. One note is the timeline should commence based on patch availability.
sunhux

ASKER
revised as follows:

"
IT Teams,

For your attention and compliance:

Please review monthly the availability of patches for the respective products under your care via the appropriate channels including products

The patches covered shall include functional, security and non-security patches.  The platforms covered include  but is not limited to server, host and workstation OS, applications, appliances or devices firmwares/microcodes/IOS

Assess if the patch is applicable to the products under your support within 5  working days from the patch release date and document this assessment, its risk rating plus the source (such as the principal’s url/link that publish the patches) in a tracking sheet as it may be required for audit

Maintain a patch register and update it within 3 working days after patching to facilitate tracking : this is an auditable item.

If you are unable to patch within the stipulated lead time after the release of patches, you are required to raise an SR with relevant  approvals to seek extension or to seek permanent exemption if the patch is known to cause issues with no known solution.

In instances where upgrades or new releases are required to address the issues published (ie no patch is available), do plan out a timeline to perform the upgrade

To minimize issues arising from patching, do test out  patches in development, SIT/UAT before rolling out to production  environment.  Obtain downtime (or if the downtime request is declined, an email to this effect) officially in email where required.

By adopting good patching practices, systems will be better protected against disruptions, undue risks, sub-optimal performance (eg: due to malicious attacks, bugs, malfunctioning or sub-optimal resource handling) which will reduce audit and regulator’s findings.
All of life is about relationships, and EE has made a viirtual community a real community. It lifts everyone's boat
William Peck
SOLUTION
btan

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.