/
Vulnerability Patch Management Process

Vulnerability Patch Management Process

Introduction

Patch management is the process of identifying, acquiring, installing, and verifying patches for products and systems. This document outlines the procedures for managing patches to ensure that systems are up-to-date and secure.

Objectives

  • Ensure the security and stability of IT systems.

  • Minimize the risk of vulnerabilities.

  • Maintain compliance with industry standards and regulations.

  • Provide a structured approach to patch management.

Process

Identification

Automation

  • Use renovate or dependabot to automatically create patches for libraries used in source code

  • Automatically rebuild all images at least once a week to apply latest base image and OS vulnerability patches on a continuous basis

Evaluation

  • Evaluate severity of each vulnerability based on CVSS 3.1 and apply according to timelines:

Critical/High

1 month

Medium

3 months

Low

6 months

  • Ensure patches compatibility with existing systems and applications

Reporting

  • In case of High or Critical severity vulnerabilities Unique reports the vulnerability and its details to partners running Unique on their own environments quarterly upon request

    • A Client can activate a proactive provision of the report as follows: Reach out to your Customer Success representative and provide them with a secure channel where you wish to receive the reports. Following this, the reports will be dispatched to the secure channel on a quarterly basis.

Deployment

  • Test patches in test environments or on non-critical systems first

  • Ensure backups are available before applying patches to production systems

  • Apply patches during low-usage periods to minimize disruption if disruption is anticipated

Verification

  • Verify that patches have been successfully applied, that systems are functioning correctly and that vulnerabilities are not exploitable anymore

Ā 


Author

@Michael Dreher

Related content

Secure Software Development Lifecycle
Secure Software Development Lifecycle
More like this
ISO 27001 and ISO 9001 certifications
ISO 27001 and ISO 9001 certifications
Read with this
Rollout Guidelines
Rollout Guidelines
More like this
Single Sign-On (SSO) setup
Single Sign-On (SSO) setup
Read with this
Phase 3: Run
More like this

Ā© 2025 Unique AG. All rights reserved. Privacy Policy ā€“ Terms of Service