Cyber Essentials (CE)

The UK government’s Cyber Essentials (CE) scheme provides a clear, baseline approach, making its patch management requirements exceptionally explicit and time-bound. CE certification requires an organisation to ensure all software is:

  • Licensed and Supported: If an asset is no longer supported by the vendor, it must be removed.
  • Patched within 14 days: This critical timeline applies to an update being released if it fixes a vulnerability the vendor describes as ‘critical’ or ‘high risk’, or has a CVSS v3 score of 7 or higher. This specific and tight deadline aims to close the window of opportunity for attackers who rapidly exploit newly published vulnerabilities.
visual timeline above hands typing on keyboard

Payment Card Industry Data Security Standard (PCI DSS)

The PCI DSS, which governs organisations that process, store, or transmit cardholder data, places a high emphasis on proactive vulnerability management, including patching. PCI DSS Requirement 6.2 mandates that organisations:

  • Ensure all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches within one month of release.
  • For critical or high-severity patches, the timeframe is often interpreted by QSAs (Qualified Security Assessors) and industry guidance to be much shorter, but the 30-day window is the explicit baseline for all security patches.

The standard also requires a formal patch management process to identify, rank, and install patches promptly based on the organisation’s risk ranking of the vulnerability.

Possibly one of the best-known standards and the basis of many other standards throughout the world, including the UK’s Security Policy Framework, originally called 20CSC or 20 Critical Security Controls.

Objective: Continuously acquire, assess, and take action on information regarding vulnerabilities to minimise risk.

Key Patching Requirements

  • Asset Coverage: Ensure all enterprise assets (servers, endpoints, mobile devices, cloud workloads) are included in vulnerability scans and patching workflows.
  • Vulnerability Identification: Use automated tools to scan for known vulnerabilities using CVE, CVSS, and SCAP standards.
  • Threat Intelligence Integration: Monitor public and private sources for emerging vulnerabilities and threat advisories.
  • Prioritisation: Rank vulnerabilities based on severity, exploitability, and asset criticality using frameworks like CVSS.
  • Remediation Timelines: Establish SLAs for patch deployment based on risk level (e.g., critical patches within 24–72 hours).
  • Verification: Validate patch application through rescan or automated confirmation mechanisms.
  • Exception Handling: Document and approve patch deferrals with compensating controls (e.g., network segmentation, monitoring).
  • Reporting: Maintain audit logs and dashboards to track patch status, coverage, and compliance.
  • Process APO12.04 (Manage Security Vulnerabilities): This control objective focuses on establishing and maintaining a process for identifying, managing, and mitigating vulnerabilities.
  • Policy-Driven Approach: COBIT requires the organisation to define a policy for security vulnerability management. While it guides organisations toward prioritising fixes based on risk and impact, the framework does not specify time limits for patch deployment. It instructs the organisation to determine what constitutes “timely” as a part of their own defined service level agreements (SLAs) or operational procedures, making the existence and documentation of the policy the primary compliance requirement.

  1. Predictability and Testing: A regular schedule allows for dedicated maintenance windows, thorough testing in sandboxed environments, and proper coordination, which prevents new patches from breaking critical business operations. This stability is an indirect but essential part of compliance.
  2. Measurable Performance: Cadence provides the crucial metrics for security governance. Organisations can track and report on metrics like “Average Time to Patch,” “Percentage of Patches Deployed by Deadline,” and “Patch Compliance Rate” to senior leadership and auditors. These metrics are the proof of compliance required by standards like NIST and ISO 27001.
  3. Prioritisation: A cadence structure allows an organisation to classify vulnerabilities by severity (CVSS score) and system criticality. Patches for high-risk, internet-facing systems can be deployed in an emergency cadence (e.g., within 48 hours), while less critical patches can be applied during a standard monthly or bi-weekly maintenance cadence.

Some Statistics from Verizon’s DBIR

Some Statistics from Verizon's DBIR
  • Median time to remediate Known Exploited Vulnerabilities (KEVs): 174 days
  • Median time for non-KEV vulnerabilities: 621 days
  • Zero-day vulnerabilities: 80% are exploited before a patch is released
  • 28.3% of vulnerabilities are exploited within 24 hours of public disclosure

Acceleration Factors

  • Organisations patch CVE-listed bugs 3.5x faster than non-CVE ones
  • Vulnerabilities known to be targeted by ransomware actors are patched 2.5x faster than other KEVs
  • Automated patch management can cut response times in half

Risk Implications

  • 80% of cyberattacks are linked to unpatched software
  • Over two-thirds of breaches stem from outdated software