Security Update Management: Staying Protected
Security update management (also known as patch management) is about keeping software current and protected against known vulnerabilities. When a vulnerability is discovered and publicised, attackers often develop exploits quickly. Timely patching is one of the most effective ways to protect your organisation.
Key Takeaways
| Point | Summary |
|---|---|
| 14-day rule | Apply high/critical severity patches within 14 days of release |
| Supported software only | Only use software that's still receiving vendor security updates |
| Enable auto-updates | Where possible, enable automatic updates for OS and applications |
| Remove unsupported | Remove any end-of-life software that no longer receives patches |
| All software in scope | OS, applications, browsers, plugins, firmware—everything needs to be patched |
Quick Answer: Cyber Essentials requires applying high/critical patches within 14 days. Only use supported software that receives updates. Enable automatic updates where possible. Remove any unsupported or end-of-life software.
Why updates matter
Software vulnerabilities are discovered constantly. Once a vulnerability becomes known, there's a race between defenders applying patches and attackers exploiting the flaw.
Typical vulnerability timeline:
- Vulnerability discovered
- Vendor notified (responsible disclosure)
- Patch developed
- Patch released—your window to patch before exploitation begins
- Exploit code developed (often within hours or days)
- Mass exploitation begins
- Your systems are vulnerable if still unpatched
The 14-day patching window exists because this timeline can be remarkably short for critical vulnerabilities.
What Cyber Essentials requires
Core requirements
| Requirement | Details |
|---|---|
| Supported software | Only use licensed, vendor-supported software |
| Critical/high patches | Apply within 14 days of release |
| Remove unsupported | Uninstall end-of-life software |
| Automatic updates | Enable where possible |
The 14-day rule
Cyber Essentials specifies that patches for vulnerabilities rated as 'Critical' or 'High' severity must be applied within 14 days:
| Severity | Timeline |
|---|---|
| Critical | Within 14 days (as soon as practical) |
| High | Within 14 days |
| Medium | Reasonable timeframe |
| Low | Next maintenance window |
What needs to be updated
Operating systems:
- Windows (Desktop and Server)
- macOS
- Linux distributions
- iOS and Android
- Any other OS in scope
Applications:
- Web browsers (Chrome, Firefox, Edge, Safari)
- Email clients
- Office suites
- PDF readers
- Media players
- Java runtime
- .NET framework
- Business applications
- Security software
Firmware:
- BIOS/UEFI
- Router firmware
- Firewall firmware
- Switch firmware
- IoT device firmware
- Network equipment
Implementing update management
Step 1: Software inventory
You can't update what you don't know you have:
| Component | Information Needed |
|---|---|
| Operating systems | Type, version, device count |
| Applications | Name, version, install location |
| Firmware | Device, current version |
| Cloud services | Which aspects are your responsibility |
Step 2: Determine support status
For each software item:
| Status | Action |
|---|---|
| Actively supported | Keep updated |
| Extended support | Plan for migration |
| End of life | Remove or isolate immediately |
| Unknown | Research and determine |
Step 3: Enable automatic updates
Where possible, automate updates:
Windows:
- Settings → Update & Security → Windows Update
- Enable automatic updates
- Configure active hours so updates don't disrupt work
- Consider Windows Update for Business for more control
macOS:
- System Preferences → Software Update
- Enable "Automatically keep my Mac up to date"
- Check all sub-options
- Consider MDM for enterprise management
Browsers:
- Chrome: Updates automatically
- Firefox: Settings → General → Firefox Updates → Auto
- Edge: Updates with Windows or automatically
- Safari: Updates with macOS
Mobile devices:
- iOS: Settings → General → Software Update → Auto
- Android: Settings → Software Update → Auto download
- Consider MDM for enterprise devices
Step 4: Manual update process
For systems that can't be automated, establish a regular process:
Weekly:
- Check vendor security bulletins
- Review vulnerability databases
- Identify applicable patches
- Prioritise by severity
Assessment:
- Review patch documentation
- Test in non-production if possible
- Plan deployment window
- Prepare rollback procedure
Deployment:
- Notify affected users if needed
- Apply patches
- Verify successful installation
- Document completion
Verification:
- Confirm system functionality
- Validate security improvement
- Update inventory records
Platform-specific guidance
Windows updates
| Setting | Recommendation |
|---|---|
| Automatic updates | Enable |
| Update schedule | Configure active hours |
| Restart policy | Auto-restart outside working hours |
| Delivery optimization | Consider enabling for bandwidth efficiency |
| WSUS/SCCM | Consider for larger environments |
Best practices:
- Don't defer security updates
- Allow feature updates after initial testing
- Monitor for failed updates
- Check Windows Update history regularly
macOS updates
| Setting | Recommendation |
|---|---|
| Automatic updates | Enable all options |
| Check frequency | Daily (default) |
| App Store apps | Auto-update enabled |
| System data files | Auto-update enabled |
Linux updates
| Distribution | Update Command |
|---|---|
| Ubuntu/Debian | sudo apt update && sudo apt upgrade |
| RHEL/CentOS | sudo yum update or sudo dnf update |
| Fedora | sudo dnf update |
Automation options:
- Unattended-upgrades (Debian/Ubuntu)
- dnf-automatic (Fedora/RHEL)
- Cron jobs
- Configuration management (Ansible, etc.)
Handling end-of-life software
Unsupported software receives no security patches, which creates significant risk.
What to do
| Situation | Action |
|---|---|
| Unsupported OS | Migrate immediately |
| Unsupported application | Replace with supported alternative |
| No alternative exists | Isolate system, add compensating controls |
| Critical business function | Prioritise migration project |
Common EOL concerns
Operating systems:
- Windows 7 reached end of life in January 2020
- Windows Server 2012 reached end of life in October 2023
- macOS versions typically have about 3 years of support
- Older Linux distributions
Applications:
- Old Office versions
- Outdated browsers (IE, old Firefox versions)
- Legacy business applications
- Unsupported third-party tools
Tracking and verification
Metrics to monitor
| Metric | Target |
|---|---|
| Critical patch compliance (14 days) | 100% |
| High patch compliance (14 days) | 100% |
| Medium patch compliance (30 days) | 95%+ |
| End-of-life software instances | 0 |
| Automatic updates enabled | 100% where possible |
Verification methods
| Method | Frequency |
|---|---|
| Vulnerability scans | Weekly or monthly |
| Manual version checks | Monthly |
| Update logs review | Weekly |
| Failed update investigation | As detected |
Common challenges and solutions
| Challenge | Solution |
|---|---|
| Update breaks application | Test first where possible, have rollback plan |
| Limited maintenance windows | Plan carefully, prioritise automation |
| Remote/disconnected devices | MDM, scheduled connections when on network |
| Legacy systems | Isolation, compensating controls |
| Bandwidth limitations | WSUS, local cache, scheduled downloads |
| User resistance | Education, policy, automation |
When updates fail
Immediate actions:
- Investigate the failure cause
- Check system logs
- Retry the update
- Document the issue
If retry fails:
- Research the specific error
- Check vendor knowledge base
- Apply manual fix if available
- Open support ticket if needed
How Bastion can help
Keeping everything updated consistently is an ongoing challenge, especially as your environment grows.
| Challenge | How We Help |
|---|---|
| Software inventory | We help discover and track what you have |
| Vulnerability awareness | We monitor for relevant security bulletins |
| Patch verification | We verify patches are applied successfully |
| EOL identification | We track software lifecycle dates |
| Reporting | We provide compliance visibility |
Working with a managed service partner means you're not relying on ad-hoc processes or hoping automatic updates are working. We bring structure and oversight to ensure patching happens consistently and nothing falls through the cracks.
Need help managing your security updates? Talk to our team
