Content library
Update and patch management
Automatically updating and running malware prevention software

Other tasks from the same security theme

Task name
Priority
Status
Theme
Policy
Other requirements
Automatically updating and running malware prevention software
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
System management
Update and patch management
26
requirements

Examples of other requirements this task affects

12.2: Protection from malware
ISO27 Full
12.2.1: Controls against malware
ISO27 Full
I09: Haittaohjelmasuojaus
Katakri
6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Self-monitoring
DE.CM-4: Malicious code detection
NIST
See all related requirements and other information from tasks own page.
Go to >
Automatically updating and running malware prevention software
1. Task description

Malware protection systems automatically check for and install updates at desired intervals and also run the desired scans at the selected frequency without needed user actions.

Keeping licensed software up to date
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
System management
Update and patch management
6
requirements

Examples of other requirements this task affects

SUM-02: Keeping licensed software up to date
Cyber Essentials
Article 9b: Prevention
DORA
2.1.8: Maintain the software code developed/used by the organisation
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Keeping licensed software up to date
1. Task description

The organisation has to make sure that all licensed software are updated with in 14 days of the update coming live when:

  • The update fixes vulnerabilities that are considered critical or high risk
  • Supplier does not release details about the severity of the vulnerability
Maintenance and updates of security systems that detect vulnerabilities
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
System management
Update and patch management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Maintenance and updates of security systems that detect vulnerabilities
1. Task description

The organization shall ensure that security systems that detect vulnerabilities and key information (such as Threat Signature) that may be used in them are updated at least weekly.

Updates should focus on enabling automation and monitoring for malfunctions.

Maintenance and updating of data systems according to manufacturer guidelines
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
System management
Update and patch management
5
requirements

Examples of other requirements this task affects

6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Self-monitoring
6.6: Tietojärjestelmien asennus, ylläpito ja päivitys
Tietoturvasuunnitelma
6.10: Työasemien, mobiililaitteiden ja käyttöympäristön tukipalveluiden hallinta
Tietoturvasuunnitelma
Article 7: ICT systems, protocols and tools
DORA
4.1: Tietojärjestelmien tietoturvallisuus
TiHL: Tietoturva
See all related requirements and other information from tasks own page.
Go to >
Maintenance and updating of data systems according to manufacturer guidelines
1. Task description

The organization must make sure that data systems are maintained and updated according to the manufacturer guidelines

Keeping open-source software up to date
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
System management
Update and patch management
1
requirements

Examples of other requirements this task affects

2.1.8: Maintain the software code developed/used by the organisation
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Keeping open-source software up to date
1. Task description

Organisations should regularly check for new versions of used open-source code. Ideally, this process is automated. New versions of open-source code can often contain new security functions, security patches, etc.

Continuous monitoring of acquired services
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
System management
Update and patch management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Continuous monitoring of acquired services
1. Task description

All externally acquired products and services should be regularly checked for the need of acquiring patches, updates and or upgrades for software and hardware.

These revisions should be acquired only from trusted providers, as well as ensured that the maintenance is only performed by the approved supplier personnel and unauthorized changes are denied.

The provenance, authenticity and integrity of these products and services has to be also confirmed and required by organizational policies and kept intact.

Any compromises in security or need for patches should be reported to leaders and relevant parties promptly.

Management process for software updates
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
System management
Update and patch management
10
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO27 Full
SUM: Security update management
Cyber Essentials
8.8: Management of technical vulnerabilities
ISO27k1 Full
Article 9b: Prevention
DORA
PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools.
CyFun
See all related requirements and other information from tasks own page.
Go to >
Management process for software updates
1. Task description

Software updates should have a management process in place to ensure that the latest approved patches and application updates are installed on all approved software. Earlier versions of software should be retained as a precaution.

Evaluating and testing patches before deployment
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
System management
Update and patch management
7
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO27 Full
6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Self-monitoring
TEK-17: Muutoshallintamenettelyt
Julkri
8.8: Management of technical vulnerabilities
ISO27k1 Full
6.6: Tietojärjestelmien asennus, ylläpito ja päivitys
Tietoturvasuunnitelma
See all related requirements and other information from tasks own page.
Go to >
Evaluating and testing patches before deployment
1. Task description

Once a vulnerability is identified, suppliers often have significant pressure to release patches as soon as possible. Therefore, the patch may not adequately address the issue and may have harmful side effects.

In evaluating patches, e.g. the following things should be taken into account:

  • whether the patch can be pre-tested properly?
  • whether it is wise to expect experience from other repairers?
  • whether the patch is available from a trusted source?
  • what are the risks of installing the patch and delaying the installation?
  • whether other actions are needed, such as disabling vulnerability features, increasing monitoring, or reporting about the vulnerability

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.

Security frameworks tend to share the common core. All frameworks cover basic topics like risk management, backup, malware, personnel awareness or access management in their respective sections.
Cyberday’s universal cyber security language technology creates you a single security plan and ensures you implement the common parts of frameworks just once. You focus on implementing your plan, we automate the compliance part - for current and upcoming frameworks.
Start your free trial
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.