(1) All employees performing roles of system or application administrators managing University ICT services and systems. This procedure also applies to contractors, vendors and others managing University ICT services and systems. (2) The University of Newcastle is committed to and is responsible for ensuring the confidentiality, integrity, and availability of the data and information stored on its systems. (3) The IT (4) This procedure covers all computers, servers, systems, applications and network infrastructure owned and maintained by the University, and the administrators of all such systems and networks. (5) This procedure is primarily aimed at system administrators and technical (6) All University owned and maintained computers, computer systems, computer networks and electronic communications devices must be updated with the latest but stable patches released by the respective vendors. (7) Patches must be deployed as per below mentioned category classification and SLAs from the time of the patch being released. (8) Note: Systems that are locked down within segregated networks may be still be vulnerable to (9) The (10) Systems and devices which are not patched via the centrally managed WSUS, SCCM or Satellite services must be updated as per the SLA With Priority as above. Where this is not possible exceptions must be obtained from the CIO and appropriate compensating controls must be implemented to mitigate the (11) Note: Exceptional cases may be considered including, but not limited to, where the impact of applying a patch (downtime etc.) is higher than the impact of not applying the patch, e.g. taking down a system running a compute job for a number of months. In such cases appropriate compensating controls must still be implemented until such time as the patch can be applied. (12) Implementation and enforcement of this procedure is the responsibility of (13) All (14) (15) IT Security:Information Security Patch Management Procedure
Section 1 - Procedure
Audience
Executive Summary
Scope
Patch Management Procedures
SLA with Priority
Device Type
Compliance
Critical
High
Medium
Low
Target
Internet Facing
5 days
7 days
30 days
90 days
100%
95%
Non-Internet Facing
7 days
30 days
60 days
90 days
100%
95%
Laptops / Desktops
7 days
10 days
60 days
90 days
100%
95%
Network Devices
Within 30 days
90 days
100%
95%
Category Definitions to be considered for Patch Deployment
Rating
Red Hat, Microsoft & Adobe Rating
Typical CVSS Score
Description
Critical
Critical
10
A vulnerability whose exploitation could allow code execution or complete system compromise without user interaction. These scenarios include self-propagating malware or unavoidable common use scenarios where code execution occurs without warnings or prompts. This could include browsing to a web page or opening an email or no action at all.
High
Important
7.0 – 9.9
A vulnerability whose exploitation could result in compromise of the confidentiality, integrity, or availability of user data, or of the integrity or availability of processing resources. This includes common use scenarios, where a system is compromised with warnings or prompts, regardless their provenance, quality or usability. Sequences of user actions that do not generate prompts or warnings are also covered.
Medium
Moderate
4.0 – 6.9
Impact of hte vulnerability is mitigated to a significant degree by factors such as authentication requirements or applicability only to non-default configurations. The vulnerability is normally difficult to exploit.
Low
Low
<4.0
This classification applies to all other issues that have a security impact. These are the types of vulnerabilities that are believed to require unlikely circumstances to be able to be exploited, or where a successful exploit would give minimal consequences.
Error Handling and Exception Handling
Error Handling
Exception Handling
Patch Enforcement
Monitoring and Reporting
Roles and Responsibilities
View Current
This is not a current document. It has been repealed and is no longer in force.
Acceptable Level
See: Understanding Red Hat Security Ratings, Adobe Priority and Severity Rating Systems for Security Bulletins, Microsoft Security Updated Severity Rating System and National Vulnerability Database Vulnerability Metrics CVSS.