Skip to main content
โ† All controls
SI-2 / A.12.6.1 / CIS-7.2 NIST SP 800-53 Rev 5

Vendor patch approval workflow documented

Demonstrate that a formal, documented workflow exists and is consistently followed for approving vendor patches prior to production deployment, including defined roles, approval gates, and testing requirements.

Description

What this control does

This control ensures a documented, repeatable workflow governs how vendor-supplied patches are evaluated, approved, and authorized for deployment in production environments. The workflow typically includes security review, compatibility testing, change approval board sign-off, and rollback planning before patches are applied to systems. Without this process, organizations risk deploying untested patches that break critical services or delaying critical security patches due to unclear approval authority, both of which create exploitable windows.

Control objective

What auditing this proves

Demonstrate that a formal, documented workflow exists and is consistently followed for approving vendor patches prior to production deployment, including defined roles, approval gates, and testing requirements.

Associated risks

Risks this control addresses

  • Deployment of incompatible patches causing unplanned outages or degraded functionality in production systems
  • Delayed application of critical security patches due to unclear approval authority or missing process steps
  • Unauthorized personnel deploying patches without security review, introducing backdoors or malicious code
  • Lack of rollback planning resulting in extended downtime when problematic patches are deployed
  • Inconsistent patch testing leading to exploitation of known vulnerabilities in untested edge-case scenarios
  • Bypassing change control processes during emergency patching, creating audit gaps and compliance violations
  • Conflicting patch schedules across departments causing service disruptions or missed security updates

Testing procedure

How an auditor verifies this control

  1. Request and review the formal patch approval workflow documentation, including process diagrams, approval matrices, and defined roles and responsibilities.
  2. Identify all stakeholders involved in patch approval (security team, system owners, change advisory board, IT operations) and verify their roles are documented.
  3. Select a sample of 10-15 patches deployed in the past 90 days across different criticality levels (critical, high, moderate) and vendor sources.
  4. For each sampled patch, retrieve change tickets, approval records, pre-deployment test results, and rollback plans from the change management system.
  5. Verify each sampled patch followed the documented workflow steps including security assessment, compatibility testing, approval sign-offs, and scheduling.
  6. Interview patch management personnel to confirm understanding of the workflow, escalation paths for emergency patches, and exceptions handling process.
  7. Review any documented exceptions or emergency patches to confirm they received post-deployment review and retrospective approval as required by policy.
  8. Cross-reference patch approval timelines against vendor release dates to assess whether critical patches were evaluated and approved within SLA timeframes.
Evidence required Auditors should collect the patch management policy document or standard operating procedure, workflow diagrams showing approval gates, change management tickets for sampled patches with attached approval records and test results, exception logs or emergency patch reports, and email or system records showing stakeholder sign-offs. Screenshots from change management systems showing workflow enforcement and approval timestamps provide corroborating evidence. Role-based access control configurations demonstrating segregation between patch submitters and approvers strengthen the evidence package.
Pass criteria The control passes if a documented patch approval workflow exists, all sampled patches within scope demonstrate adherence to the documented workflow including required approvals and testing, and any documented exceptions received appropriate post-deployment review.

Where this control is tested

Audit programs including this control