About this program
How fast are you patching workstations, servers, network gear and third-party apps? 8-question maturity check.
Risks addressed
- Critical Unpatched workstation exploited via drive-by / phish
- Critical Public-facing server compromised via known CVE
- High Legacy systems remain unpatchable without compensating controls
- High Network gear firmware lag introduces RCE / auth bypass risk
Controls (8)
-
Patch policy with SLAs by severity
HighPatch policy with SLAs by severity
How to test + evidence
Testing procedure: Review policy: critical <=7d, high <=14d, medium <=30d (or local equivalent).
Evidence to collect: Policy document.
-
Asset inventory drives patching scope
HighAsset inventory drives patching scope
How to test + evidence
Testing procedure: Confirm the asset inventory feeds the patch tool; no shadow devices.
Evidence to collect: Inventory-to-patch crosswalk.
-
Workstations patched within SLA
HighWorkstations patched within SLA
How to test + evidence
Testing procedure: Pull patch compliance report for endpoints; >=95% within SLA over 90 days.
Evidence to collect: Patch tool dashboard.
-
Servers patched within SLA
HighServers patched within SLA
How to test + evidence
Testing procedure: Same as above for server estate.
Evidence to collect: Patch tool dashboard.
-
Third-party app patching covered
MediumThird-party app patching covered
How to test + evidence
Testing procedure: Confirm browsers, Java, Adobe etc. are managed (not just OS).
Evidence to collect: Software inventory + tool coverage.
-
Network gear firmware patched
MediumNetwork gear firmware patched
How to test + evidence
Testing procedure: Routers, switches, firewalls patched within vendor recommended cadence.
Evidence to collect: Firmware version inventory.
-
Exception process for unpatchable systems
MediumException process for unpatchable systems
How to test + evidence
Testing procedure: Compensating controls + risk acceptance documented for any legacy systems.
Evidence to collect: Exception register.
-
Vulnerability scans verify patch state
HighVulnerability scans verify patch state
How to test + evidence
Testing procedure: Authenticated scans confirm patch state matches the patch tool.
Evidence to collect: Recent scan + reconciliation.