{"id":25602,"date":"2023-02-24T23:00:00","date_gmt":"2023-02-24T23:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25602"},"modified":"2023-08-11T17:20:30","modified_gmt":"2023-08-11T17:20:30","slug":"patch-management-best-practices","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/","title":{"rendered":"Patch Management Best Practices &#038; Steps"},"content":{"rendered":"\n<p>Everyone needs effective patch management. This critical but tedious process secures organizations of all sizes by eliminating vulnerabilities and delivering product upgrades.<\/p>\n\n\n\n<p>Patching requires urgency. Attackers begin to reverse engineer patches immediately to exploit unpatched systems, even as organizations can leave known vulnerabilities unpatched for years. A Ponemon Institute survey of breach victims found that <a href=\"https:\/\/www.servicenow.com\/lpayr\/ponemon-vulnerability-survey.html\" target=\"_blank\" rel=\"noreferrer noopener\">60% of attacks<\/a> exploited known vulnerabilities that had patches that hadn&#8217;t been applied yet.<\/p>\n\n\n\n<p>Patching remains a problem because the details of execution can overwhelm an organization. Best practices for patching apply to organizations of all sizes and can improve time-to-patch, but the implementation will vary enormously depending on resources.<\/p>\n\n\n\n<p>Best practices for patch management include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong><a href=\"#asset\">Asset Management<\/a>:<\/strong> Know what you have and the current status.<\/li>\n\n\n\n<li><strong><a href=\"#risk\">Risk Management<\/a>:<\/strong> Know how important systems are and the risk to the organization if they fail or are compromised.<\/li>\n\n\n\n<li><strong><a href=\"#documentation\">Documentation<\/a>:<\/strong> Set expectations, track status, and communicate clearly.<\/li>\n\n\n\n<li><strong><a href=\"#patching\">Effective Patching Process<\/a>:<\/strong> Effectively and efficiently obtain the correct patches, ensure their effectiveness, and deploy them with minimal operational impact.<\/li>\n\n\n\n<li><strong><a href=\"#management\">Mistake Management<\/a>:<\/strong> Plans, processes, and technology can fail so know what to do to recover.<\/li>\n<\/ol>\n\n\n\n<p>This article will explore each practice in detail to explain each role, minimum expectations, and provide tips to help make a smooth process. For a quick review of the topic, see: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">What is Patch Management?<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"asset\"><strong>1. Asset Management<\/strong><\/h2>\n\n\n\n<p>To know what to patch, an organization first needs to know what it has. This is more formally called Asset Discovery, which the NIST Cybersecurity Framework, CIS Critical Security Controls, and other frameworks use as the foundation on which to build a strong cybersecurity program.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Minimum Expectations<\/h3>\n\n\n\n<p><strong>Use automated tools.<\/strong> A clipboard and paper or excel inventory only works for the very smallest organizations. Even modest-sized organizations adopt automated tools to scour the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network<\/a> for every device, endpoint, server, operating system (OS), and application. Yet beware, some automated software may only track hardware, so a patch management team needs to understand tool limitations.<\/p>\n\n\n\n<p><strong>Track critical assets. <\/strong>If the failure of the asset can disrupt the business or cause costly data breaches, track it. Most organizations track all endpoint terminals (PCs, laptops, tablets, mobile phones, etc.), servers, cloud resources (containers, repositories, and other in-house managed infrastructure), critical software (accounting software, HR software, etc.), and network equipment used regularly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Next Level Implementation<\/h3>\n\n\n\n<p><strong>Track all assets<\/strong>, not just computers. Larger organizations understand the risk of ignoring the <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/iot-device-risk-to-enterprises\/\" target=\"_blank\" rel=\"noreferrer noopener\">internet of things<\/a> (security cameras, Wi-Fi enabled TVs, etc.), operational technology (wi-fi controlled pumps, temperature sensors, etc.), <a href=\"https:\/\/www.esecurityplanet.com\/trends\/healthcare-cyberattacks-increase-mortality\/\" target=\"_blank\" rel=\"noreferrer noopener\">medical technology<\/a> (especially wireless devices), <a href=\"https:\/\/www.esecurityplanet.com\/applications\/pos-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">point-of-sale (POS) systems<\/a>, and rarely used assets.<\/p>\n\n\n\n<p><strong>Track app assets. <\/strong>Asset tracking also applies to applications developed in-house. While this will probably be managed by a separate <a href=\"https:\/\/www.esecurityplanet.com\/products\/devsecops-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">DevSecOps<\/a> team, the chief security officer should still receive reports regarding the <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/sbom\/\" target=\"_blank\" rel=\"noreferrer noopener\">software bill of materials (SBOM)<\/a> and the status (version, last update, etc.) of application components.<\/p>\n\n\n\n<p><strong>Anticipate exceptions<\/strong> that may require special controls or planning. For example, in a hospital, the patient record database cannot go down and the Windows 95 machine controlling the MRI machine cannot be upgraded. These will need to fall outside of the standard processes for special handling or extra security controls.<\/p>\n\n\n\n<p>Also, users need the ability to delay patches temporarily. No IT team wants to explain to the VP of Sales why mandatory update restarts disrupted a very important presentation. However, IT teams also need the ability to force restarts for employees that continuously push off updates.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pro Tips<\/h3>\n\n\n\n<p><strong>Effective asset management tools<\/strong> can often identify the current versions of the software or firmware. This will make it easier to track assets and determine if patches or more current versions may be available.<\/p>\n\n\n\n<p><strong>Standardized assets<\/strong> can reduce the burden on the IT team to track assets and their current status. Many organizations replace PCs in larger batches or limit software installations to reduce the number of hardware and software configurations to track and maintain. Organizations centralizing control or executing a merger will often inventory software categories (accounting, HR, etc.) and switch all users onto a single software package to help simplify updates (among other benefits).<\/p>\n\n\n\n<p><strong>Place assets in context<\/strong> using various network maps and diagrams to identify network segments, networking equipment, firewalls, and security controls that protect each asset. This context will play a role later in determining the overall risk of unapplied patches.<\/p>\n\n\n\n<p><strong>Quarantine unpatched unauthorized and BYOD devices<\/strong> that fall outside of the organization\u2019s patch management control. <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Network access control (NAC) solutions<\/a> can detect and quarantine devices that lack security patches and updates to protect the network.<\/p>\n\n\n\n<p><strong>Also see:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-it-asset-management-tools-for-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top IT Asset Management (ITAM) Tools for Security<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"risk\"><strong>2. Risk Management<\/strong><\/h2>\n\n\n\n<p>Risk management requires an organization to understand the value of an asset (device, database, application, etc.) and the value of data contained in, secured by, or flowing through that asset. Risk should also reflect the damage to the organization if the asset fails or becomes compromised.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Minimum Expectations<\/h3>\n\n\n\n<p><strong>Start with the most important. <\/strong>At the very least, risk management profiles should be in place for the most valuable and operationally critical infrastructure most likely to be targeted or affected by an attack. The number of assets that can be tracked may depend upon the resources of the organization and its ability to use the information effectively.<\/p>\n\n\n\n<p><strong>Characterize the likelihood of an attack<\/strong> based upon the security and operational controls defending the asset. Ratings can be categorical such as High\/Medium\/Low or rated 1\/2\/3\/4 and these ratings should be used to prioritize the importance of patching the asset. For example, a data storage server rated medium value and low risk of attack will be of lower priority than the customer application server rated of high value and high risk receives its patches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Next Level Implementation<\/h3>\n\n\n\n<p><strong>Use <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/risk-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>risk management software<\/strong><\/a> to manage and maintain current risk profiles of tracked assets. The better software will enable an enterprise to characterize the risk in currency (US dollars, Euros, etc.) to help justify security spending to protect the asset. Ideally, the risk management, asset management, patch management and other related software can interconnect to share information and enable real-time analysis, automated prioritization, and alerts.<\/p>\n\n\n\n<p><strong>Group assets<\/strong> by risk class to help manage large numbers of assets, enable operational efficiency, and effective prioritization. A categorical asset class can speed up the assignment of a risk to an asset. However, this technique is best for large numbers of non-critical assets (workstations, switches, etc.). Key assets should be individually assessed.<\/p>\n\n\n\n<p><strong>Segregate patch-exempt assets<\/strong>. Not all assets can be patched. While upgrades may be preferred, sometimes it isn\u2019t possible so the devices need to be segregated. For example, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/attacks-escalating-against-linux-based-iot-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">hardcoded credentials<\/a> in IoT devices (especially medical technology) may require those devices to be placed on a separate network segment with a whitelist device list or similar security controls that protect against access from unauthorized access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pro Tips<\/h3>\n\n\n\n<p><strong>Harden security by default.<\/strong> Many organizations allow vulnerabilities and open ports to remain on assets perceived to be buried within the network behind firewalls and other controls. However, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-zero-trust\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero trust<\/a> philosophies require organizations to assume compromised networks and the frequent effectiveness of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/what-ransomware-attackers-look-for\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware attacks<\/a> indicates this assumption will be accurate more often than an organization might like.&nbsp;<\/p>\n\n\n\n<p>Disabling unneeded protocols and unnecessary ports to harden assets will reduce a potential attack surface. Hardened infrastructure also lowers the overall risk of the organization &#8211; and reduces the urgency for some patches.<\/p>\n\n\n\n<p><strong>Context matters. <\/strong>Risk scores should incorporate the results of current vulnerability scans, possible public access (internet connections, physically accessible in a public place, etc.), and known vulnerabilities left unpatched.<\/p>\n\n\n\n<p><strong>Upgrade and retire legacy technology.<\/strong> Some technologies, especially in hospitals and for industrial applications, enjoy a lifespan that outlives the operating system required to manage the technology. MedTech and OT is notorious for requiring the maintenance of Windows 95, Windows 7, and other obsolete operating systems that can no longer be patched.<\/p>\n\n\n\n<p>The cost to protect these systems continually increases both in hard dollars as well as the labor cost of the IT security team to implement controls. Organizations need to accurately assess these costs and invest in replacing obsolete technology.<\/p>\n\n\n\n<p>Keep in mind that some upgrades may be possible that accomplish the same goals. For example, an obsolete Windows 95 computer can often be replaced with a fully updated Windows 11 machine that can host a secured virtual environment with a Windows 95 emulator.<\/p>\n\n\n\n<p>Blocking potential attack paths for assets that can&#8217;t be patched or haven&#8217;t yet been patched is another defensive tactic, a process known as <a href=\"https:\/\/www.esecurityplanet.com\/applications\/virtual-patching\/\" target=\"_blank\" rel=\"noreferrer noopener\">virtual patching<\/a>.<\/p>\n\n\n\n<p><strong>Account for legal risk<\/strong>. When calculating the risk of an asset consider the legal liability for the organization if an adversary gains control. What would the legal liability cost the organization if the asset was unpatched and a judge, jury, or regulator found the organization to be negligent?<\/p>\n\n\n\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Best Patch Management Software &amp; Tools<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"documentation\"><strong>3. Documentation<\/strong><\/h2>\n\n\n\n<p>Many IT professionals seem allergic to documentation. However, documentation helps to set expectations, track status, and communicate clearly within the patch management team and to other stakeholders.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Minimum Expectations<\/h3>\n\n\n\n<p><strong>Adopt a basic <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/patch-management-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>patch management policy<\/strong><\/a> to establish baseline requirements for what to patch, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-process\/\">patching process<\/a> details, how to manage exceptions, and how to manage disruptions. A few weeks of negotiations can prevent more permanent grudges between departments.<\/p>\n\n\n\n<p><strong>Schedule patching and downtime<\/strong> to minimize impact and disruptions to operations. Determine the approval process, notices (internal, customer, etc.), approvals, and other documentation required when assets must be disabled or restarted to apply patches.<\/p>\n\n\n\n<p><strong>Generate reports<\/strong> to track what assets were upgraded\/patched, exceptions, and any issues encountered. Good documentation makes the next patching cycle more efficient and helps prevent confusion during IT team transitions or incident response.<\/p>\n\n\n\n<p><strong>Assign ownership<\/strong> of patch management to an executive or manager and make it a key performance indicator. The process can be delegated or even outsourced, but ensure the designated executive or manager remains familiar with the results and the process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Next Level Implementation<\/h3>\n\n\n\n<p><strong>Patch management team definition and coordination<\/strong> is required at the enterprise level due to extra complexity. Patching may be performed by multiple patch management teams, cover diverse IT environments, and be forced to meet multiple compliance standards. Better patch management tools can help coordinate activities, classify assets, embed workflows, and enable comprehensive reporting.<\/p>\n\n\n\n<p><strong>Change management<\/strong> policies and reports will be needed to establish who notification requirements, how specific changes should be documented, what reports should be generated afterwards. Change management reports help to verify approved changes to critical assets as opposed to unauthorized and potentially malicious changes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pro Tips<\/h3>\n\n\n\n<p><strong>Be detailed.<\/strong> Specify the members of the patch management team and their responsibilities clearly. Determine required notification processes in detail. If different processes or teams will be required for specific technologies (servers, cloud platforms, etc.) create exhibits with specific teams and requirements. However, be careful not to be so detailed that the IT team cannot flexibly make adjustments according to available resources and circumstances.<\/p>\n\n\n\n<p><strong>Publicize patching processes<\/strong> to make regular patching processes known and predictable for the organization. Users get used to the regular process and understand that normal patching isn\u2019t typically disruptive or burdensome. This also adds credibility to urgent patches by making them seem even more important.<\/p>\n\n\n\n<p><strong>Take patching seriously<\/strong> and require the reporting of key metrics at the executive level such as the percent of devices patched, the time to patch for critical and non-critical patches, exception reports, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"patching\"><strong>4. Effective Patching Process<\/strong><\/h2>\n\n\n\n<p>The key goals for patch management often conflict because quick application of patches to block security vulnerabilities can introduce disruption to operations and require already-committed IT resources. An effective patching process manages these conflicts to obtain the correct patches, ensure their effectiveness, and deploy them with minimal operational impact.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Minimum Expectations<\/h3>\n\n\n\n<p><strong>Monitor for updates<\/strong>, especially the most critical assets.&nbsp; Many vendors offer email or similar mechanisms to notify teams of updates; for example, almost all organizations should directly or indirectly subscribe to <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/technical-security-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Technical Security Notifications<\/a>.<\/p>\n\n\n\n<p><strong>Only use verified sources<\/strong> to download patches and updates. Some malicious hacking groups create websites and phishing attacks offering security updates embedded with malware.<\/p>\n\n\n\n<p><strong>Automate where possible.<\/strong> Small IT teams can be overwhelmed with the volume of updates on top of their day-to-day duties. Various vendors provide patch management tools that automate patching for specific assets (Windows machines, macOS, third-party software, networking equipment, etc.). Some vendors also offer free tiers for smaller companies. Before adopting a specific tool, verify what assets will be covered and test the tool to verify it will relieve and not burden the patch management team.<\/p>\n\n\n\n<p>Some small businesses rely upon Microsoft\/Apple automated patch management built into the operating system, but they need to recognize two key weaknesses. First, the organization will not have visibility into the status of the endpoint or when patches may fail or be delayed by users. Second, the OS may be a critical asset, but it is hardly the only asset that needs to be updated on a regular basis. An OS-centric update will neglect vital updates for Adobe, Google, Mozilla, Oracle, and many other vendors and applications. A more formal and centralized patch management tool or service is a superior option.<\/p>\n\n\n\n<p><strong>Prioritize patches<\/strong> based upon the risk of the asset and the criticality of the vulnerability being patched. Non-critical patches should be updated on a scheduled basis to minimize disruption.<\/p>\n\n\n\n<p><strong>Coordinate with operations<\/strong> or other stakeholders and follow careful communication and pre-approved procedures for patches that will cause operational disruptions.<\/p>\n\n\n\n<p><strong>Audit assets to locate failed patches<\/strong> or to recover devices or assets disrupted by an applied patch.<\/p>\n\n\n\n<p><strong>Report results<\/strong> as required by the patch management policy (see above) or basic KPIs. Update the asset list with the latest software\/firmware versions to make future patching processes more efficient.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Next Level Implementation<\/h3>\n\n\n\n<p><strong>Threat intelligence<\/strong> and government resources such as the <a href=\"https:\/\/nvd.nist.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIST National Vulnerability Database<\/a> should enhance vendor monitoring for vulnerability and patch announcements. These feeds provide additional context regarding actively exploited vulnerabilities and helps to prioritize patches that may be actively exploited or especially critical.<\/p>\n\n\n\n<p><strong>Leverage vendor relationships<\/strong>, register devices, and keep in contact with sales reps and suppliers to receive patch notices as quickly as possible. Some vendors have been known to provide direct notice to customers in advance of public vulnerability and patching announcements.<\/p>\n\n\n\n<p><strong>Centralize patch management<\/strong> to consolidate expertise, reporting, and eliminate redundancies (repetitive testing, waiting for redundant rollout, etc.). Centralized patch management can also create local network distribution points to reduce network and internet traffic from thousands of machines reaching out to a vendor\u2019s site to download patches.<\/p>\n\n\n\n<p><strong>Patch priority<\/strong>, relevance and urgency can be more difficult to determine in enterprise environments. Diverse technology, version inconsistency between offices, and variations in the tech stack complicate the understanding of risk and how vulnerabilities might apply.<\/p>\n\n\n\n<p>\u201cIt is hard for many enterprises to accept the fact they cannot patch everything,\u201d explains Bob Kelly, director of product management at Flexera. \u201cAs little as one in 10 patches actually get deployed due to challenges in identifying, testing, and rolling out updates to the constant backlog of security updates coming on a daily basis.&#8221;<\/p>\n\n\n\n<p>A patch management solution that integrates with risk values, threat intelligence, and <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\" target=\"_blank\" rel=\"noreferrer noopener\">CVSS 3.1<\/a> can help to automate or at least rapidly understand the risk profile of the vulnerability. Also, keep in mind that unapplied patches may be replaced by subsequent patches. An organization will need to make sure that obsolete patches are dropped from the queue.<\/p>\n\n\n\n<p><strong>Verify security control assumptions.<\/strong> Controls can mitigate vulnerabilities and decrease urgency, but those controls must be verified. For example, verify there is no overlooked access to a critical vulnerability on a database server that is supposed to be only accessible on an internal network. Bad assumptions can undermine the understanding of risk and leave critical assets more exposed than expected.<\/p>\n\n\n\n<p><strong>Test patches<\/strong> in a test environment to check for conflicts with other software, hardware, and IT architecture. If resources are constrained, focus on critical patches and critical systems. Testing is typically out of reach for smaller organizations, and can cause critical delays for high-risk patches.<\/p>\n\n\n\n<p>Fortunately, many patch management tools and <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-service-providers\/\" target=\"_blank\" rel=\"noreferrer noopener\">service providers<\/a> include patch testing as part of their package &#8211; with some testing patches within hours of their release. While pre-tested patches may eliminate the risk of broad disruption, keep in mind that each organization&#8217;s architecture and assets will be unique and may experience unusual circumstances.<\/p>\n\n\n\n<p><strong>Limited patch rollout<\/strong> to specific devices. Staggered deployment allows the patch management team to observe results and lower the network bandwidth requirements of large scale patch deployments. Limited deployment can also limit the damage of unexpected conflicts from a patched vulnerability.<\/p>\n\n\n\n<p>\u201cApplications and computer systems are extremely complex, and there\u2019s always a chance that a new update may create unintended problems,\u201d cautions Lou Fiorello, vice president and&nbsp; general manager of security products at ServiceNow. \u201cRoll out a new patch in a controlled environment before trusting it with an entire network.\u201d<\/p>\n\n\n\n<p><strong>Next level-automated tools<\/strong> expand patch management to networking equipment, servers, IoT devices, and a wide variety of third-party software. However, different tools will have different management and integration capabilities so patch management teams may need multiple tools and still have some assets that require manual patching because they are not covered or because they require manual processes.<\/p>\n\n\n\n<p><strong>Redundant and failover systems<\/strong> provide a built-in test environment for patch deployment and for less disruptive patch roll-out. A web server\u2019s failover clone can be patched and checked for potential conflicts. Once verified as successfully updated, the failover server can be deployed as the primary server and the former primary server can be updated and put into service as the failover system. Cloud, containers, and SaaS technologies often use this technique to maximize uptime.<\/p>\n\n\n\n<p><strong>Extend patching to AppBoM.<\/strong> Larger organizations with application development need to monitor open source code and libraries in their application bill-of-materials. The DevOps or DevSecOps teams may have an independent patch management process, but their own patch management reports should be reported to executives either separately or in a consolidated report.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pro Tips<\/h3>\n\n\n\n<p><strong>Patch with urgency.<\/strong> Mandiant estimates that more than 27% of disclosed vulnerabilities are exploited <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/time-between-disclosure-patch-release-and-vulnerability-exploitation\" target=\"_blank\" rel=\"noreferrer noopener\">less than a month<\/a> after the release of a patch. Lower risk systems can be patched with less urgency, but keep in mind that <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero-day attacks<\/a> or other undetected vulnerabilities can allow attacks on those lower risk systems to jeopardize systems of much higher value.<\/p>\n\n\n\n<p><strong>Patching priority does not equate to risk value. <\/strong>Some organizations exclusively patch Common Vulnerability Scoring System (CVSS) vulnerabilities with a score of 7 or higher, but attackers take advantage of this trend. \u201cWe are seeing an uptick in exploitation of vulnerability in the 5\u20137 range because hackers know that those scored 7 and higher are more likely to be mitigated faster,\u201d warns Bob Kelly, director of product management at Flexera.<\/p>\n\n\n\n<p>Organizations need to combine CVSS scores with risk ratings and known exploits. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) maintains a <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">list of known exploited vulnerabilities<\/a>. The list currently only shows about 900 vulnerabilities \u2013 a seemingly small number when more than 20,000 new vulnerabilities are identified each year \u2013 but it still requires good asset discovery and prioritization to target just that relatively small list.<\/p>\n\n\n\n<p>Combining risk management, CVSS scores, and active exploitation will create a patching priority such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Patch critical vulnerabilities with high CVSS scores with known exploits within 72 hours of release.<\/li>\n\n\n\n<li>Patch vulnerabilities with known exploits within 7 calendar days of release.<\/li>\n\n\n\n<li>Patch known vulnerabilities with high CVSS scores within 10 business days of release.<\/li>\n\n\n\n<li>Patch other updates within 30 days of release.<\/li>\n<\/ul>\n\n\n\n<p><strong>Hire expertise or outsource<\/strong> if patch management goals cannot be met using in-house resources. Patch management is one of the most widely outsourced functions for <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-managed-service-provider\/\">managed IT service providers<\/a> (MSPs) who can patch a wide range of systems and software for competitive prices. Before signing a service agreement, companies should verify that the MSP will meet or exceed the patch management goals for patch deployment speed, minimized operational disruption, and reporting.<\/p>\n\n\n\n<p>Also read:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">Is the Answer to Vulnerabilities Patch Management as a Service?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management-as-a-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vulnerability Management as a Service (VMaaS): Ultimate Guide<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Best Third-Party Risk Management (TPRM) Tools<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"management\"><strong>5. Mistake Management<\/strong><\/h2>\n\n\n\n<p>Even the best plans, processes, and technology can fail. Organizations need to maintain disaster recovery plans and processes to recover systems in a broad range of scenarios. The elements of disaster recovery for patch management revolve around restoring systems and data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Minimum Expectations<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Backups<\/strong><\/a><strong> <\/strong>should always be executed prior to patching to enable effective roll back or back-out of updates. Local system backups often will work, but in the event of a catastrophic patch failure, independent backups on different assets will be needed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Next Level Implementation<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Vulnerability scans<\/strong><\/a> should be conducted after patching to verify proper installation and to check for potentially undisclosed issues. Some patches have been known to cause conflicts with security tools or introduce new vulnerabilities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pro Tips<\/h3>\n\n\n\n<p><strong>Periodic <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>penetration tests<\/strong><\/a> should be conducted to verify that the controls protecting unpatched systems remain effective. Risk assessments assume controls continue to work; however, these assumptions should be tested.<\/p>\n\n\n\n<p><strong>Also read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">8 Best Disaster Recovery Solutions<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bottom Line: Patch or Pay<\/h2>\n\n\n\n<p>Organizations that execute patch management effectively will enjoy many benefits such as improved security, improved features, and avoiding costly incident responses. Effective patching policies prevent far more costly emergency IT responses that force overtime and additional costs for asset recovery.<\/p>\n\n\n\n<p>More importantly, breaches can also trigger compliance violations that lead to lawsuits and regulatory fines. Many governments such as <a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/essential-eight\" target=\"_blank\" rel=\"noreferrer noopener\">Australia<\/a> and the <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-40\/rev-4\/final\" target=\"_blank\" rel=\"noreferrer noopener\">United States<\/a> list vulnerability patching as fundamental IT security practices so failure to patch will likely be viewed as negligence and punishable by stiff penalties.<\/p>\n\n\n\n<p>Patch management can be boring because it is so fundamental. However, execution can be complex and many breaches reveal that many struggle to manage their processes well. Best practices can enable effective implementation of the patching process and should be adopted by organizations of all sizes.<\/p>\n\n\n\n<p><strong>Read next:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n\n<p><em>This article was originally written by <\/em><a href=\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"><em>Drew Robb<\/em><\/a><em> on October 21, 2022. It was updated by Chad Kime on February 24, 2023.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e72091378-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e72091378\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e72091378\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e72091378\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e72091378\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e72091378\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e72091378\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Everyone needs effective patch management. This critical but tedious process secures organizations of all sizes by eliminating vulnerabilities and delivering product upgrades. Patching requires urgency. Attackers begin to reverse engineer patches immediately to exploit unpatched systems, even as organizations can leave known vulnerabilities unpatched for years. A Ponemon Institute survey of breach victims found that [&hellip;]<\/p>\n","protected":false},"author":271,"featured_media":25604,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,3790,3414,23006,730,22929,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,378,31780,31775,392],"class_list":["post-25602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cloud-security","tag-cybersecurity","tag-network-security","tag-patch-management","tag-security","tag-vulnerability-management","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-endpoint-security","b2b_product-patch-management","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Patch Management Best Practices &amp; Steps | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Patch management is complex. Follow these best practices for patch management to keep your systems up-to-date and secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Management Best Practices &amp; Steps | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Patch management is complex. Follow these best practices for patch management to keep your systems up-to-date and secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-24T23:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-11T17:20:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Patch Management Best Practices &#038; Steps\",\"datePublished\":\"2023-02-24T23:00:00+00:00\",\"dateModified\":\"2023-08-11T17:20:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/\"},\"wordCount\":3656,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"network security\",\"Patch Management\",\"security\",\"Vulnerability Management\",\"Web security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/\",\"name\":\"Patch Management Best Practices & Steps | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg\",\"datePublished\":\"2023-02-24T23:00:00+00:00\",\"dateModified\":\"2023-08-11T17:20:30+00:00\",\"description\":\"Patch management is complex. Follow these best practices for patch management to keep your systems up-to-date and secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg\",\"width\":1088,\"height\":725,\"caption\":\"patch management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Management Best Practices &#038; Steps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Patch Management Best Practices & Steps | eSecurity Planet","description":"Patch management is complex. Follow these best practices for patch management to keep your systems up-to-date and secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Patch Management Best Practices & Steps | eSecurity Planet","og_description":"Patch management is complex. Follow these best practices for patch management to keep your systems up-to-date and secure.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/","og_site_name":"eSecurity Planet","article_published_time":"2023-02-24T23:00:00+00:00","article_modified_time":"2023-08-11T17:20:30+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg","type":"image\/jpeg"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Patch Management Best Practices &#038; Steps","datePublished":"2023-02-24T23:00:00+00:00","dateModified":"2023-08-11T17:20:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/"},"wordCount":3656,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg","keywords":["cloud security","cybersecurity","network security","Patch Management","security","Vulnerability Management","Web security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/","url":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/","name":"Patch Management Best Practices & Steps | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg","datePublished":"2023-02-24T23:00:00+00:00","dateModified":"2023-08-11T17:20:30+00:00","description":"Patch management is complex. Follow these best practices for patch management to keep your systems up-to-date and secure.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/Security-06-1088x725-1.jpeg","width":1088,"height":725,"caption":"patch management"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Patch Management Best Practices &#038; Steps"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25602"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25602"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25602\/revisions"}],"predecessor-version":[{"id":31446,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25602\/revisions\/31446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25604"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25602"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25602"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25602"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}