(1) All employees performing roles of system or application administrators managing (2) The University of Newcastle is committed to and is responsible for ensuring the confidentiality, integrity, and availability of the data and information stored on its systems. (3) This manual defines the minimum required standards for the management of patch application for (4) (5) Effective implementation of these minimum standards will help limit the (6) This manual covers all computers, servers, systems, applications and network infrastructure owned or maintained by the (7) This manual is primarily aimed at System Administrators and technical (8) This manual also extends, as far as practicable, to third parties who manage ICT services and systems on behalf of the (9) All (10) The recommended process for patch management is: (11) The following are the maximum timeframes within which a patch must be deployed once released by a vendor. The timeframes vary depending on the potential attack vectors and the potential business impact should the service become unavailable. (12) Note: Systems that are locked down within segregated networks may be still be vulnerable to (13) The System Administrator is responsible for identifying and rectifying failed patch deployments. Compliance with approved patches must be verified at least on a weekly basis. (14) Systems and devices that are not patched via the centrally managed WSUS, SCCM or Satellite services must be updated as per the timeframes in the Patch Applications Target table above. Where this is not possible exceptions must be obtained from the CIO and appropriate compensating controls must be implemented to mitigate the (15) Note: Exceptional cases may be considered including, but not limited to, where the impact of applying a patch (downtime etc.) is higher than the impact of not applying the patch, e.g. taking down a system running a compute job for a number of months. In such cases appropriate compensating controls must still be implemented until such time as the patch can be applied. (16) Implementation and enforcement of these minimum standards is the responsibility of the System Administrator. The Information Security Team will conduct random external and internal vulnerability assessments to ensure compliance with these minimum standards without notice. Any system found in violation of these minimum standards shall require corrective action. (17) All System Administrators responsible for the management of systems defined within the scope above are required to compile and maintain monthly reporting metrics that summarise the outcome of each patching cycle. These reports shall be used to evaluate the current patching levels of all systems and to assess the current (18) Applications that are no longer supported by vendors with patches or updates for security vulnerabilities must be updated or replaced with vendor-supported versions. (19) Operating systems for workstations, servers and ICT equipment that are no longer supported by vendors with patches or updates for security vulnerabilities must be updated or replaced with vendor-supported versions. (20) System Administrator: (21) The Information Security Team are responsible for the following:Information Security Patch Management Manual
Section 1 - Audience
Section 2 - Executive Summary
Section 3 - Scope
Section 4 - Patch Management
Patch Management Process
Patch Application Targets
System or
Device Type
Compliance
Critical
High
Medium
Low
Target
Internet Facing
48 hours
14 days
30 days
90 days
100%
95%
Non-Internet Facing
7 days
30 days
60 days
90 days
100%
95%
Laptops / Desktops
7 days
30 days
60 days
90 days
100%
95%
Network Devices
Within 30 days
90 days
100%
95%
Category Definitions to be considered for Patch Deployment
Rating
Red Hat, Microsoft & Adobe Rating
Typical CVSS Score
Description
Critical
Critical
10
A vulnerability whose exploitation could allow code execution or complete system compromise without user interaction. These scenarios include self-propagating malware or unavoidable common use scenarios where code execution occurs without warnings or prompts. This could include browsing to a web page or opening an email or no action at all.
High
Important
7.0 – 9.9
A vulnerability whose exploitation could result in compromise of the confidentiality, integrity, or availability of user data, or of the integrity or availability of processing resources. This includes common use scenarios, where a system is compromised with warnings or prompts, regardless their provenance, quality or usability. Sequences of user actions that do not generate prompts or warnings are also covered.
Medium
Moderate
4.0 – 6.9
Impact of the vulnerability is mitigated to a significant degree by factors such as authentication requirements or applicability only to non-default configurations. The vulnerability is normally difficult to exploit.
Low
Low
<4.0
This classification applies to all other issues that have a security impact. These are the types of vulnerabilities that are believed to require unlikely circumstances to be able to be exploited, or where a successful exploit would give minimal consequences.
Error Handling and Exception Handling
Error Handling
Exception Handling
Patch Enforcement
Monitoring and Reporting
Cessation of Support
Roles and Responsibilities
View Current
This is not a current document. It has been repealed and is no longer in force.
Acceptable Level
See: Understanding Red Hat Security Ratings, Adobe Priority and Severity Rating Systems for Security Bulletins, Microsoft Security Updated Severity Rating System and National Vulnerability Database Vulnerability Metrics CVSS.