Damoov Patch management policy

Effective August 2019

Overview

Regular application of vendor-issued critical security updates and patches are necessary to protect Damoov data and systems from malicious attacks and erroneous function. All electronic devices connected to the network including servers, workstations, firewalls, network switches and routers, tablets, mobile devices, and cellular devices routinely require patching for functional and secure operations.

Purpose

Software is critical to the delivery of services to Damoov customers and Damoov users. This policy provides the basis for an ongoing and consistent system and application update policy that stresses regular security updates and patches to operating systems, firmware, productivity applications, and utilities. Regular updates are critical to maintaining a secure operational environment.

Scope

This policy applies to all Damoov employees and sub-contractors who create, deploy, or support application and system software.

POLICY

General

All system components and software shall be protected from known vulnerabilities by installing applicable vendor supplied security patches. System components and devices attached to the Damoov network shall be regularly maintained by applying critical security patches within thirty (30) days after release by the vendor. Other patches not designated as critical by the vendor shall be applied on a normal maintenance schedule as defined by normal systems maintenance and support operating procedures.

SYSTEM, UTILITY AND APPLICATION PATCHING

A regular schedule shall be developed for security patching of all Damoov systems and devices. Patching shall include updates to all operating systems as well as office productivity software, database software, third-party applications (e.g. Mongo DB, Microsoft services, etc.), and mobile devices.

Most vendors have automated patching procedures for their individual applications. There are a number of third-party tools to assist in the patching process and Damoov should make use of appropriate management software to support this process across the many different environments. The regular application of critical security patches is reviewed as part of normal change management and audit procedures.

PATCHING EXCEPTIONS

Patches on production systems (e.g. servers and enterprise applications) may require complex testing and installation procedures. In certain cases, risk mitigation rather than patching may be preferable. The risk mitigation alternative selected should be determined through an outage risk to exposure comparison. The reason for any departure from the above standard and alternative protection measures taken shall be documented in writing for devices storing non-public data. Deviations from normal patch schedules shall require [Insert Appropriate Role] authorization.

SECURITY PATCHING PROCEDURES

Policies and procedures shall be established and implemented for vulnerability and patch management. The process shall ensure that application, system, and network device vulnerabilities are:
  • Evaluated regularly and responded to in a timely fashion
  • Documented and well understood by support Employees
  • Automated and regularly monitored wherever possible
  • Executed in a manner applicable vendor-supplied tools on a regularly communicated schedule
  • Applied in a timely and orderly manner based on criticality and applicability of patches and enhancements

Audit Controls and Management

On-demand documented procedures and evidence of practice should be in place for this operational policy as part of the Damoov internal systems change management and update procedures. Examples of adequate controls include:

  • Documented change management meetings and conversations between members of the architectural committee.
  • System updates and patch logs for all major system and utility categories
  • Logs should include system ID, date patched, patch status, exception, and reason for exception
  • Demonstrated infrastructure supporting enterprise patch management across systems, applications, and devices

Enforcement

Employees found in policy violation may be subject to disciplinary action, up to and including termination.

Distribution

This policy is to be distributed to all Damoov employees and sub-contractors responsible for support and management.