56.50.16 - Patch Management
TTUHSC El Paso system developers and integrators are required to create and implement Threat Analysis and Flaw Remediation plans and initiatives as advocated by the State and Federal Regulations.1 This policy is to serve as a means of protecting and maintaining TTUHSC El Paso systems, infrastructure, network and Information Resources from vulnerabilities, breaches, and other threats in a timely and secure manner.
This policy will be reviewed and updated in March of every Odd Numbered Year (ONY) by the Information Security Officer (ISO) and the Chief Information Officer (CIO), or when necessary as dictated by governing entities.
The following are areas of focus but are not exhaustive procedures and guidelines for Patch Management.
Threat Analysis 2
- Asset custodians and data/process owners are required to:
- Address new threats and vulnerabilities on an ongoing basis and ensures these applications
are protected against known attacks by either of the following methods:
- Reviewing applications via manual or automated application vulnerability security assessment tools or methods, at least annually and after any changes; or
- Installing an application firewall.
- Verify that public-facing web applications are reviewed (using either manual or automated
vulnerability security assessment tools or methods), as follows:
- At least annually;
- After any changes;
- By an organization that specializes in application security;
- That all vulnerabilities are corrected; and
- That the application is re-evaluated after the corrections
- Address new threats and vulnerabilities on an ongoing basis and ensures these applications are protected against known attacks by either of the following methods:
Vulnerability Scanning 3
- The organization :
- Scans for vulnerabilities in systems and hosted applications and when new vulnerabilities potentially affecting the system/applications are identified and reported;
- Employs vulnerability scanning tools and techniques that promote interoperability
among tools and automate parts of the vulnerability management process by using standards
- Enumerating platforms, software flaws, and improper configurations;
- Formatting and making transparent, checklists and test procedures; and
- Measuring vulnerability impact;
- Analyzes vulnerability scan reports and results from security control assessments;
- Remediates legitimate vulnerabilities in accordance with an organizational assessment of risk; and
- Shares information obtained from the vulnerability scanning process and security control assessments with designated personnel throughout the organization to help eliminate similar vulnerabilities in other systems (e.g., systemic weaknesses or deficiencies).
- TTUHSC El Paso’s vulnerability management team is solely responsible for approving and overseeing the use of any enterprise scanning and assessment tools. The use of any other vulnerability scanner is prohibited without prior, written approval by the vulnerability management team.
Flaw Remediation 4
- The organization :
- Employs weekly patch maintenance schedule update patches or fixes as available on institutional computing devices per findings of tools and vulnerability scans.
- Regular maintenance shall include but is not limited to: institutional systems, servers, file shares, et cetera.
- In the event an extended amount of time is needed for patching, IT provide notification regarding downtime via email notification.
- System owners and system custodians are responsible for implementing appropriate mitigations and recommendations.
Interference with patch management and flaw remediation efforts by any employee, student, or vendor, may result in the disciplinary actions as defined in HSCEP Information Technology Policy 56.01.10. 5
All other IT Policies can be found at https://elpaso.ttuhsc.edu/it/policies/
- TAC 202.74
- NIST 800-53 SA-11(a) Threat Analysis & Flaw Remediation
- NIST 800-53 RA-05 Vulnerability Scanning
- TTUHSC El Paso Antivirus Procedure & Maintenance Schedule
- 56.01.10 Disciplinary Process