Why patching matters more than ever
Patch management SLAs and prioritization
Automation and compliance requirements
Key Takeaways
TL;DR
Unpatched vulnerabilities are a top attack vector — formalize your patching approach.
Set SLAs by severity: critical within 14 days, high within 30, medium within 60.
Prioritize CISA KEV entries and internet-facing systems above CVSS score alone.
Automate patching for operating systems and common third-party applications.
Document exceptions with compensating controls when patches can't be applied on schedule.
FAQ
Frequently asked questions
What is a reasonable SLA for critical patches?
14 calendar days is the industry standard for critical vulnerabilities (CVSS 9.0+). CISA's BOD 22-01 requires federal agencies to patch KEV entries within 14 days for internet-facing systems. Many cyber insurance carriers use this same benchmark during underwriting.
How do I handle patches that break applications?
Document the exception in your patch management policy. Include the affected system, the reason the patch can't be applied, compensating controls in place (network segmentation, enhanced monitoring), and the planned remediation date. Test patches in a staging environment before deploying to production when possible.
Does Cyber Defense Agent check for missing patches?
Cyber Defense Agent's external scan can detect outdated software versions on internet-facing systems (web servers, mail servers, CMS platforms). For internal patch compliance, you'll need an internal vulnerability scanner or RMM platform. CDA's framework mapping identifies where patch management fits in your compliance posture.
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.