What is patch management?

Before we consider patch management – it’s worth starting with the basics!

What’s a patch?

Essentially, a patch is update that performs one or more of three functions:

  • Security updates – patches that fix a vulnerability.
  • Feature updates – patches that introduce new functionality or improvements to user experience and performance.
  • Bug fixes – patches that correct coding problems that prevent desired functionality.

What types of patches are there?

Hardware patches involve making physical changes to a device’s hardware component.

Examples include BIOS updates for graphics cards or CPU microcode updates.

These are software patches that address code that sits between hardware and operating system.

Examples could include router or printer firmware updates to improve stability.

OS patches typically fix vulnerabilities or bugs in a device’s operating system.

Examples include Windows, macOS, Linux security updates.

Application patches fix bugs and vulnerabilities in software or introduce new features for software that sits on a device.

Examples include MSOffice, browser or media player updates.

The Patch Management Process

Patching and updating is reasonably straightforward for an individual device. The complexity increases with the number and range of devices that require management. Some may be on premise, others could be distributed geographically, especially as many operations teams are required to support remote working. Patch deployment should really be considered as one step in a continuous process. Every organization has unique requirements, but your ongoing process should contain the steps below as a minimum for best practice.

The Patch Management Life Cycle
  • 1

    The first step is to establish what you need to manage. This can be achieved manually through a survey; however, most organizations will use a discovery tool to identify devices. It’s important to know which applications run on every endpoint and understand any dependencies too.

  • 2

    Grouping and prioritizing devices is essential to giving the highest level of protection to critical infrastructure or services. Ideally, you will conduct this review as part of your business continuity planning. Devices that run applications that are critical to business operations will naturally get preferential treatment.

  • 3

    Establishing policies will allow you to maintain standards and reduce workloads as it is far more efficient than treating every endpoint in a unique way.

  • 4

    As part of your policy definition, you should determine standard configurations for each of the device groups you are managing. This way, new devices can be provisioned systematically, and you can prevent configuration drift; this is essential to optimizing your patching and maintaining compliance.

  • 5

    There are many ways to find out about new patches. Organizations that use a patch management solution will be automatically notified when a relevant patch is issued. For teams that deal with a steady stream of patches, it is important to understand the context of an update so that it can be prioritized correctly. For example: routine updates that introduce new features or improve performance can be scheduled to deploy outside of working hours so that disruption is minimized for users – whereas critical security updates should be implemented as quickly as it is safe to do so.

  • 6

    Many patch management tools will provide pre-tested patches and accompanying documentation to highlight any deployment difficulties that may arise. But, as best practice, you should test before patching to critical endpoints or applications. Setting up small groups of representative devices for testing is a good strategy for streamlining this process; it also helps teams to learn and get used to the results they would expect to see. In addition to ensuring the endpoint is functioning properly – critical applications and services must also be checked to see if there is any impact on them.

  • 7

    There are multiple factors to consider when it comes to the patch deployment itself. In an ideal world, every endpoint would be connected to the network when updates are attempted – and not in use – but this is rarely the case. So, operations teams need to know when to schedule or force updates and be aware of interdependencies.

  • 8

    When the deployment is complete, the next step is to check the results and evaluate any negative impact. Patch management solutions will provide an rollback facility in the event that endpoints need to be reset to their previous version.

  • 9

    Reporting and analytics are often overlooked, however, there is increasing pressure from senior management teams, cyber insurers, and regulators to compel organizations to demonstrate diligence and compliance.

  • 10

    And, finally, as if that isn’t enough – there is always room for improvement. So regular reviews will help you streamline activities further and pivot towards a more proactive approach. A top tip is to review incidents where things didn’t go so smoothly while they are still fresh in the memory, so that insights can be used to update processes effectively.

Patching for different types of endpoints

Patching Windows devices is crucial due to their widespread use in both personal and enterprise environments. Regular updates are essential to address vulnerabilities, enhance system performance, and ensure compatibility with new software. Windows patch management should include automated deployment, detailed reporting, and compliance tracking to maintain security and operational efficiency. Additionally, it’s important to test patches in a controlled environment before deployment to prevent potential disruptions.

Linux systems are often used in server environments and critical infrastructure, making timely patching vital for maintaining security and stability. Linux patch management should focus on automating updates, monitoring system health, and ensuring minimal downtime during patch deployment. It’s also important to manage dependencies and test patches in sandbox environments to avoid compatibility issues. Regular vulnerability scanning and compliance checks can help identify and address potential risks promptly.

Mobile devices, including smartphones and tablets, require consistent patching to protect against rapidly evolving security threats. Mobile Device Management (MDM) solutions can help enforce security policies, manage updates, and ensure that all devices comply with organizational standards. Given the diverse operating systems (iOS, Android) and device models, a comprehensive patch management strategy should include remote troubleshooting tools and automated workflows to streamline the update process.

Patching Mac devices is essential to protect against security vulnerabilities and ensure optimal performance. Mac patch management should include automated update deployment, detailed reporting, and integration with existing IT infrastructure. Given the increasing use of Macs in enterprise settings, it’s important to have a solution that supports remote management and enforces security policies. Regular updates not only enhance security but also improve compatibility with new applications and features.

Patching third-party software is critical to maintaining a secure and efficient IT environment. Many security vulnerabilities originate from outdated applications, making it essential to keep all software up-to-date. A comprehensive patch management solution should automate the detection and deployment of updates for third-party applications, ensuring they are consistently patched alongside operating system updates. This approach minimizes security risks, enhances software performance, and ensures compatibility with other systems. Regular monitoring and reporting can help track the status of third-party software patches and ensure compliance with organizational policies.

Patch Tuesday is the day tech giants like Microsoft roll out their latest software updates. It occurs every second Tuesday of each month and has been observed by Microsoft for over twenty years. These updates are crucial—they fix security flaws and boost software performance. Occasionally, if there’s a critical issue, updates might drop outside this schedule, known as “out-of-band” updates.

Most authorities on cybersecurity advice organizations to allow automatic software updates. In most cases, this is best practice – especially if you don’t have a patch management solution in place. In all cases, this policy should go hand-in-hand with cybersecurity awareness training to ensure users can identify phishing emails that pretend to include important update information. In addition, updates should be applied over a trusted network connection whenever possible or using a VPN connection if not.

Relying on users to update their own devices can increase risk, buy you may have specific devices or applications that require special attention. A good example of this is your website content management system (CMS). Unless a vulnerability is already actively being exploited, you might prefer to update a test version or staging site first, in order to make sure the update doesn’t bring down your website.

If you’re struggling with patch management, you’re not alone. As cyber threats rise, effective patch management is crucial to protect your organization. This Help Net Security article offers a step-by-step guide to streamline your process, prioritize critical updates, and ensure smooth deployment. Don’t let vulnerabilities like WannaCry catch you off guard—learn how to safeguard your systems and enhance your security posture.

When formulating a patch management strategy for your organization a key factor to take into consideration is risk. There are many types of risk that arise from cybersecurity, these include reputational, financial, and operational. They can and should be measured in terms of cost to give you a clear idea of their impact and this can be calculated as follows:

(Threat×Vulnerability×Probability of Occurrence×Impact)
Mitigation controls

Where:

Threat: The potential cause of a cyber incident (this can include insider threats as well as targeted threats from bad actors or potential collateral damage from a supply chain incident.

Vulnerability: The weakness that can be exploited by any of these threats. Vulnerabilities can be caused by poor access management, misconfiguration, or human error as well as software or operating system issues.

Probability of Occurrence: The realistic chances of vulnerability being exploited – this will largely depend on what a threat actor can gain out of an attack. Factors to be taken into consideration here are the type and value of the information you process, the likelihood of having a ransom paid and the effort required to execute the attack.

Impact: The potential damage or loss if the threat is realized.

Mitigation controls: Any measures you have in place to reduce the risk of a vulnerability being exploited.

Essentially – the more your organization stands to lose, the more care you should take to protect it. This formula can help to you prioritize risks and allocate resources effectively to safeguard against critical threats; those where you stand to lose the most. For example, even if your organization has a limited digital footprint – you may need to invest more in measures to mitigate threats because of the value of your data or the potential catastrophic impact of cyber incident on your reputation.

Patch management in cybersecurity – is it an offensive or defensive measure?

Mitigation measures fall broadly into two camps – offensive and defensive. To effectively reduce risk – you should include both as part of any risk reduction strategy.

 Offensive cybersecurity measures are proactive strategies designed to identify and address vulnerabilities before attackers can exploit them. Common techniques include penetration testing, which simulates attacks to uncover and fix weaknesses; red teaming, which tests the effectiveness of security measures through simulated attacks; threat hunting, which involves actively searching for potential threats by identifying and recognizing “threat signatures”; and phishing simulations, which test employees’ responses to simulated phishing attacks to enhance awareness and training. These methods help organizations stay ahead of potential threats and strengthen their overall security posture.

 Defensive cybersecurity measures are reactive strategies designed to protect systems and respond to attacks. Common techniques include firewalls, which block unauthorized network access; intrusion detection systems (IDS), which monitor network traffic for suspicious activity; antivirus software, which detects and removes malicious software; encryption, which protects data by converting it into a secure format; access controls, which restrict access to sensitive information based on user roles; and incident response plans, which prepare for and respond to security breaches. These measures help safeguard systems and ensure a robust defense against cyber threats.

Patch management is primarily a defensive mitigation strategy. It involves regularly updating software and systems to fix vulnerabilities and protect against potential threats. By applying patches, organizations can close security gaps that attackers might exploit, thereby strengthening their overall security posture. That said, with the addition of vulnerability scanning and remediation capabilities, modern patch management tools are moving ever closer to proactively protecting your infrastructure.

Managing Software Update Dependencies

As part of your ongoing cataloguing of devices and applications you will need to understand three main types of dependency:

  1. Compatibility: Software that runs on a virtual or physical devices must have sufficient resources available for it to function properly. Resource intensive applications are commonly developed to run on specific operating system (OS) versions, so it’s vital to check if updates are compatible with OS versions and hardware. Equally, OS updates can impact the performance of applications and may need to be delayed until a compatible version of the application is released.
  2. Sequencing: It is crucial to follow the specified order when applying updates. Each step must be completed in sequence to ensure the system’s integrity and security. Skipping any step can lead to potential issues or leave vulnerabilities unpatched.
  3. Interdependencies: Software components frequently rely on each other where they run in a specific ecosystem. One example is the ecosystem of software used to manage sales and marketing. Applications including content management systems (CMS), marketing automation, customer relationship management (CRM) and accounting software could require specific versions to be in place for connectors or API integrations to work. Another (critical) ecosystem is the stack of applications you use to manage security. Updating one system might require updates to others to guarantee functionality and security.

Do patches always work?

In a word – No! As we’ve seen, simply applying all patches is no guarantee of success. Updating in the right sequence is critical, especially as problem patches can be replaced in some cases. Patch supersedence occurs if a new software update or patch replaces an older one. This new patch not only addresses the issues fixed by the previous patch but also includes additional improvements or fixes. Essentially, the newer patch makes the older one obsolete.

Problems can also occur if Network Connectivity is interrupted whilst patch deployment is happening. Keeping a reliable network connection is crucial for downloading and applying updates. A dropped connection can result in multiple issues:

Losing a network connection during a software patching process can lead to several issues, depending on the type of patch and the stage at which the connection is lost. Here are some potential consequences:

  • Incomplete Installation: A lost connection can halt the patch, leaving your software unstable or unusable. Expect crashes and unpredictable behavior.
  • Corrupted Files: Interrupted patches can corrupt files, potentially requiring a full software or OS reinstallation.
  • Security Vulnerabilities: An incomplete patch leaves your system exposed to security threats, as critical flaws remain unaddressed.
  • System Instability: Expect frequent crashes and performance issues, especially in critical systems needing high availability.
  • Rollback Issues: If the connection drops, rollback mechanisms might fail, leaving your system in a limbo state.
  • Data Loss: Database updates interrupted by a lost connection can lead to data loss or corruption, which can be tough to recover.

And then of course there are always vendor related #patchfail problems. Even if you deploy the right patches in the correct order to right devices – the content of the patch itself may cause loss of service, data loss, or compromised security. As a result, rollback capabilities and test management are often key features valued in patch management solutions.

The top 10 patching failures of 2024

  • CrowdStrike Update Failure (July 2024): A faulty update from CrowdStrike caused global outages, affecting Windows computers and disrupting businesses, airports, and healthcare sectors.

  • Windows 11 Update Issues (June 2024): The KB5039302 cumulative update for Windows 11 caused login errors and high system usage due to WFP drivers.
  • Windows 10 Update Problems (May 2024): The KB5037849 non-security update led to various issues, including system crashes and application failures.
  • Microsoft Azure Outage (July 2024): A significant outage in one of Microsoft’s Azure cloud regions affected many services across the central United States.
  • Apple iOS 16.5 Update (May 2024): The iOS 16.5 update caused battery drain issues and connectivity problems for many users.
  • SAP Update Failure (April 2024): An update to SAP’s enterprise resource planning (ERP) software caused significant disruptions for several large corporations. The update led to data synchronization issues and system crashes, impacting business operations and requiring urgent patches to resolve the problems.
  • Google Chrome Update (April 2024): A Chrome update led to browser crashes and performance issues, affecting millions of users worldwide.
  • Adobe Creative Cloud Update (March 2024): An update to Adobe Creative Cloud caused application crashes and data loss for some users.
  • Linux Kernel Update (February 2024): A kernel update for Linux distributions caused boot failures and system instability.
  • Salesforce Update (January 2024): A Salesforce update led to data synchronization issues and downtime for several businesses.

Patch management software

Whatever solution you choose, automation is central to the benefits it can bring. This is because manual patching typically takes 10x more resource than using a patching tool. Understanding your unique IT landscape—its scale and complexity— is fundamental to choosing the right tool to help your organization manage patching. Modern solutions can juggle multiple operating systems from one console, so if your infrastructure is diverse this type of solution will make the process smoother and potentially cut costs.

Patch management solutions vs a managed service, which is best?

Patch management tools can help improve security as well as reducing overall costs and risk, but they may not be right for every organization. Your IT and security function exists to support the business meet its objectives – if this means fast adoption of new technologies, your teams could run the risk of holding the business back if they can’t onboard new software in a safe and timely way. The main advantage of adopting a managed service a faster onramp to new services and types of devices. And, this can outweigh the additional cost.

Pros:

  1. Control: You have full control over the patching process and can customize it to fit your specific needs.
  2. Cost-Effective: Generally, a one-time purchase or subscription fee can be more economical in the long run.
  3. Flexibility: You can choose and switch between different tools and solutions as needed.
  4. In-House Expertise: Builds internal expertise and knowledge within your IT team.
  5. Data Security: Greater control over data security and compliance with internal policies.

Cons:

  1. Resource Intensive: Requires significant time and effort from your IT team to manage and maintain.
  2. Complexity: Managing patches across diverse systems and applications can be complex.
  3. Initial Setup: Can be time-consuming and require a steep learning curve.
  4. Scalability: May struggle to scale efficiently with growing business needs.
  5. Risk of Human Error: Increased potential for mistakes during the patching process.

Pros:

  1. Expertise: Access to specialized knowledge and expertise from the service provider.
  2. Efficiency: Frees up your internal IT team to focus on other critical tasks.
  3. Scalability: Easily scalable to accommodate business growth and changing needs.
  4. Proactive Management: Service providers often offer proactive monitoring and management.
  5. Reduced Downtime: Managed services can minimize downtime by ensuring timely and efficient patching.

Cons:

  1. Cost: Ongoing service fees can be higher than a one-time purchase of a solution.
  2. Less Control: Reduced control over the patching process and reliance on the service provider.
  3. Data Security Concerns: Potential risks associated with sharing sensitive data with a third party.
  4. Vendor Dependency: Dependence on the service provider for timely updates and support.
  5. Customization Limitations: May have limited ability to customize the patching process to your specific needs.

Patch management tools – what should you look for?

Every organization is different. The number and types of devices supported, as well as the applications you use, form a unique digital footprint. This footprint, combined with risk will dictate how important patch management to your business and justify the cost of any tool employed.

Are there Patch Management tools for different types of organization?

In a word: yes! As our guide to endpoint security shows, there are standalone patch management tools, but the capability can be included in a broader solution or platform.

Common terms for solutions that can include patch management include Unified Endpoint Management (UEM), Remote Monitoring and Management (RMM), Endpoint Detection and Response (EDR), Mobile Device Management (MDM), and Automated Moving Target Defense (AMTD). Solutions that have RMM capabilities are tailored to the needs of managed service providers.

If you are already using a tool that has overlapping functionality, for example – vulnerability management, you can choose whether to opt for a point solution, live with the overlap or move to a broader solution and retire the existing. There are pros and cons for each option, including the effort of migration, cost and performance impact on the endpoint. Whilst having multiple vulnerability management solutions could be viewed as beneficial – having multiple agents on a device with competing patching regimes can introduce conflict.

There distinct advantages with combined vulnerability and patching management, a single solution helps to coordinate security and IT operations and give clearer insight into compliance. That said, IT and security operations teams that work independently, may prefer tools that are specifically designed for their needs.

Are there Patch Management tools for different types of endpoints?

In addition to MDM solutions, that are restricted to managing patches for mobile devices there are also tools which specialize in a single type of device or operating system. This includes proprietary systems like VMware vSphere and Azure Update Manager and specialist tools that manage updates for Apple devices or Internet of Things (IoT) endpoints.

If you manage a diverse environment – using a tool with comprehensive coverage can make your life easier and ensure your policies are applied consistently.

How much does a patch management solution cost?

In general, most patching tools are priced on the number of endpoints managed. The price will vary based on the range of functionality included, for example, a Unified Endpoint Management solution – that includes vulnerability management – will cost more than one that only offers patch management. You can expect pay around $3 per endpoint for a low-end product. A comprehensive solution could cost more than twice as much, but it may allow you to consolidate your stack and reduce costs in other areas. Organizations with many devices can often take advantage of volume discounts, and subscriptions paid in advance may be more cost effective than a monthly billed one.

Regardless of the type of solution you select, your chosen vendor should provide you with a business case proposal that includes all the costs associated with the product (including training, support, and deployment if appropriate) and savings you can expect to achieve.

Another way to ensure you always have sufficient resources available for patch management is to include these as part of your software and device maintenance costs. This has the advantage of helping you to understand the true cost of adding an application or rolling out an equipment refresh.

What are the key features of a patch management solution?

When evaluating patch management solutions, it’s crucial to consider whether the system is cloud-based or on-premise. On-premise systems require significant upfront investment and ongoing maintenance, while cloud-based systems offer ease of deployment and maintenance, often through a SaaS subscription model. Key features include agent-based or agentless options, remote endpoint support, and comprehensive device and operating system support. Additionally, these solutions should provide automated patch deployment, detailed reporting, and compliance tracking to ensure all devices are up-to-date and secure. Integration with existing IT infrastructure and scalability to accommodate growing networks are also important factors to consider.

Advanced patch management tools offer features like mobile device management (MDM), zero trust policies, and remote troubleshooting tools. These solutions can enforce security policies, remotely manage devices, and automate complex workflows. Integration with service desk tools and software distribution support further enhance their capabilities, making them indispensable for modern IT environments. Other advanced features may include vulnerability scanning, patch testing in sandbox environments, and rollback options to revert patches if issues arise. These tools often come with dashboards and analytics to provide insights into patch compliance and security posture.

Commercial factors

When selecting a patch management solution, consider the licensing model, customer support, and additional costs. On-premise tools often use a perpetual licensing model with annual maintenance fees, while cloud-based solutions typically offer subscription-based pricing. Excellent customer support, including training and onboarding services, is essential for maximizing the tool’s effectiveness. It’s also important to evaluate the total cost of ownership, which includes not only the initial purchase price but also ongoing maintenance, updates, and potential downtime costs. Look for vendors that offer flexible pricing plans and robust support options to ensure a smooth implementation and ongoing operation.

Evaluating vendors

If you have assessed your requirements in terms of the number and types of endpoints you want to manage, you are already half-way to choosing the best solution for your organization. But selecting a vendor (or managed service provider) is more than a simple box ticking exercise. If you’re committing the security of your endpoints and, consequently your data, to a 3rd party – your trust in their product and their business is paramount. There are multiple ways you can do this, here are five examples:

  1. Research vendors thoroughly – look for case studies and detailed product information. Make sure you know all the questions you want to ask their sales team in advance. Involving other stakeholders in this exercise will spread the workload and ensure buy-in to the selected product.
  2. Some technology research analysts publish reports on patch management solutions – find out which vendors are highly regarded.
  3. Look for positive testimonials on review sites, even better if their business is like yours.
  4. Try before you buy – most vendors offer a free trial or proof of concept (POC) option – but check if you will be using a fully-featured version of the product.

Request a reference call with a customer – this is a great way to discover how the product works in the real world and can give you insights into the quality of the vendor’s support. If this is a critical part of your selection process, you may be required to provide occasional reference calls when you are customer.