Infrequent or inadequate patching exposes the organization to significant risk of corrupt systems and stolen information. This nature of software alarmed the federal regulators who in the fall of 2003 dictated that all financial institutions develop an adequate patch management program to reduce the risks posed by these flaws.
The federal regulators declared that a patch management program be part of the financial organization’s information security plan. They also stated that failure to maintain an adequate plan can adversely affect an institution’s overall IT examination rating. With the release of FDIC: FIL-43-2003 the FDIC identified these four steps to a compliant patch management program:
1. Development of appropriate organizational procedures.
Like all programs, a structure needs to be created to facilitate the patch management plan.
2. Monitoring software vulnerabilities and identifying corrective patch information.
Patch management is a pro-active pursuit.
3. Evaluating the impact of patches.
Once a patch has been identified the next step is to assess the impact of that patch on the environment.
4. Testing and installing software patches.
The next step is to test each patch prior to installation.
5. Report to the Board of Directors.
Section 501(b) of the Gramm-Leach-Bliley Act stipulates that institutions must perform periodic risk assessments and present the findings to the Board of Directors.
More info: [url=http://www.bankinfosecurity.com/?q=node/view/554]http://www.bankinfosecurity.com/?q=node/view/554[/url]