Skip to main content
← All controls
SI-2 / A.12.6.1 / CIS-7.3 NIST SP 800-53 Rev 5

Patch management

Demonstrate that the organization systematically identifies vulnerabilities in operating systems, applications, and firmware, and deploys security patches within defined timeframes aligned to risk severity.

Description

What this control does

Patch management is the process of identifying, testing, approving, and deploying security updates and software patches to systems, applications, and firmware across the enterprise. Organizations maintain an inventory of all patchable assets, establish risk-based prioritization criteria (such as CVSS scores or vendor severity ratings), and enforce deployment timelines based on criticality—often 30 days for critical vulnerabilities, shorter for actively exploited flaws. Effective patch management reduces the attack surface by closing known vulnerabilities before adversaries can exploit them, while minimizing operational disruption through change control and rollback procedures.

Control objective

What auditing this proves

Demonstrate that the organization systematically identifies vulnerabilities in operating systems, applications, and firmware, and deploys security patches within defined timeframes aligned to risk severity.

Associated risks

Risks this control addresses

  • Exploitation of publicly disclosed vulnerabilities with available exploit code or active exploitation in the wild
  • Unauthorized remote code execution through unpatched web servers, databases, or application frameworks
  • Ransomware and worm propagation leveraging unpatched operating system vulnerabilities (e.g., SMBv1, PrintSpooler)
  • Privilege escalation by attackers exploiting kernel or driver vulnerabilities in unpatched endpoints
  • Compromise of internet-facing infrastructure due to delayed patching of critical VPN, firewall, or load balancer firmware
  • Compliance violations and audit findings resulting in financial penalties or suspension of certifications
  • Operational disruption or data loss caused by unplanned emergency patching or system failures from exploitation

Live threat patterns this control mitigates:

Testing procedure

How an auditor verifies this control

  1. Obtain and review the current patch management policy, including defined roles, responsibilities, patching timelines, and severity classification criteria.
  2. Request a complete asset inventory extract showing all systems, applications, and firmware subject to patch management, including last scan date and ownership.
  3. Review the vulnerability scanning configuration and reports from the past 90 days to verify coverage across all in-scope assets and scanning frequency.
  4. Select a representative sample of 15-25 critical and high-severity vulnerabilities disclosed in the past 90 days and trace their identification, assessment, approval, and deployment through ticketing or change control records.
  5. For each sampled vulnerability, validate the actual deployment timeline against the organization's policy thresholds by reviewing patch deployment logs, configuration management database (CMDB) records, or endpoint management console reports.
  6. Examine exception and risk acceptance documentation for any vulnerabilities that exceeded policy timelines, verifying appropriate management approval and compensating controls.
  7. Verify the existence and test results of a patch testing environment or process, including evidence of rollback procedures for at least one recent patch deployment.
  8. Interview IT operations and security teams to confirm patch deployment coordination, emergency patching procedures, and handling of zero-day vulnerabilities.
Evidence required Collect the patch management policy document, asset inventory exports with patch status, vulnerability scan reports from the testing period, change management tickets or approvals for sampled patches, deployment logs or SCCM/Intune/WSUS console screenshots showing installation dates, risk acceptance forms for overdue patches, and patch testing procedures or staging environment configuration documentation.
Pass criteria The control passes if vulnerability scans cover all in-scope assets at required frequencies, the sampled critical and high-severity patches were deployed within policy timelines (or have documented approved exceptions with compensating controls), and evidence demonstrates a repeatable process for identification, testing, approval, and deployment.

Where this control is tested

Audit programs including this control