ISMS

Patch Management for Mid-Market Companies: Process, Prioritization, and Automation

TL;DR
  • Over 60% of all successful cyberattacks exploit known vulnerabilities for which a patch was already available.
  • NIS2 lists vulnerability management as one of the ten minimum measures (Article 21, Paragraph 2e). A documented patch process is mandatory.
  • The patch process consists of five phases: Identify, Prioritize, Test, Deploy, Verify.
  • CVSS scores and the CISA KEV list form the basis for prioritization. Critical vulnerabilities in exposed systems are patched first.
  • Automation via WSUS, Intune, Ansible, or comparable tools is not a luxury for SMEs but a prerequisite for a functioning process.

Why patching is the most important baseline defense

There is a statistic that has barely changed for years: over 60 percent of all successful cyberattacks exploit vulnerabilities for which a patch was already available at the time of the attack. This means the majority of security incidents could have been prevented if the affected systems had been updated in time. Not with a new product, not with an expensive solution, but with an update the vendor provided for free.

That sounds simple, and conceptually it is. In practice, it looks different. A mid-market company with 200 employees typically operates several hundred systems: workstations, servers, network components, printers, phone systems, possibly production controllers. Each of these systems has an operating system and multiple applications that need regular updates. Microsoft alone releases between 50 and 150 security updates on Patch Tuesday every month. Add patches for Linux servers, firmware updates for firewalls and switches, updates for third-party software like Adobe, Java, Chrome, Zoom -- and the list goes on.

The challenge is not that patches are unavailable. The challenge is keeping track, setting the right priorities, testing before rollout, and documenting the entire process so it is auditable. That is exactly what this article is about.

What ISO 27001 and NIS2 require for patch management

ISO 27001 addresses patch management in multiple controls. Annex A.8.8 (Management of technical vulnerabilities) requires that information about technical vulnerabilities of systems in use be obtained promptly, that the organization's exposure to these vulnerabilities be assessed, and that appropriate measures be taken. Annex A.8.19 (Installation of software on operational systems) supplements the requirement that software installation, including updates, must be controlled and documented.

NIS2 is even more explicit. Article 21, Paragraph 2, Letter e lists "security in the acquisition, development, and maintenance of network and information systems, including vulnerability handling and disclosure" as one of the ten minimum measures. The BSI interprets this in its NIS2 implementation guidance as an obligation to maintain a documented vulnerability and patch management process. Organizations subject to NIS2 must be able to demonstrate that they systematically identify, assess, and remediate vulnerabilities.

For your ISMS, this means: you need a documented patch management process with defined roles, time targets, and escalation paths. And you must be able to demonstrate that this process is actually being followed -- not just existing on paper.

The patch process in five phases

A structured patch process consists of five phases that are cycled through continuously. Each phase has clear inputs, activities, and outputs.

Phase 1: Identify

The first phase is about detecting new vulnerabilities and available patches. You need three information sources for this:

Vendor advisories: Microsoft Security Update Guide, Cisco Security Advisories, VMware Security Advisories, and the corresponding channels of all other vendors whose products you use. Subscribe to their RSS feeds or mailing lists so you are informed promptly.

Vulnerability databases: The National Vulnerability Database (NVD) from NIST and the CVE database (Common Vulnerabilities and Exposures) are the central references. Every known vulnerability receives a CVE number and a CVSS score. Particularly important is the CISA KEV list (Known Exploited Vulnerabilities), which contains vulnerabilities that are demonstrably being actively exploited.

Vulnerability scanners: Tools like Nessus, OpenVAS, Qualys, or the vulnerability scanner integrated into Microsoft Defender check your systems regularly for known vulnerabilities and missing patches. A weekly scan is the minimum; for exposed systems, a daily scan is recommended.

The output of this phase is a list of open vulnerabilities with CVE number, affected systems, CVSS score, and available patches.

Phase 2: Prioritize

Not every patch has the same urgency. A critical remote code execution vulnerability in a web server that is reachable from the internet has an entirely different priority than a local privilege escalation bug in an internal development system. Prioritization determines which patches are applied immediately, which get addressed in the regular maintenance window, and which can be consciously deferred.

The foundation for prioritization is a matrix combining two dimensions: the severity of the vulnerability and the criticality of the affected system.

Vulnerability severity (CVSS score):

The CVSS score (Common Vulnerability Scoring System) rates vulnerabilities on a scale from 0 to 10. The rating follows a standardized methodology that considers factors such as attack vector, attack complexity, required privileges, and impact on confidentiality, integrity, and availability.

The severity levels are: Low (0.1 to 3.9), Medium (4.0 to 6.9), High (7.0 to 8.9), and Critical (9.0 to 10.0). In addition to the CVSS score, check whether the vulnerability is on the CISA KEV list, meaning it is demonstrably being actively exploited. A vulnerability with CVSS 7.5 that is actively exploited has higher practical priority than a theoretical vulnerability with CVSS 9.0 without a known exploit.

System criticality:

Criticality comes from your IT asset inventory and protection requirements analysis. An externally reachable server has higher criticality than an internal test server. A system processing personal data has higher criticality than an information display. The combination of both yields the patch priority.

The prioritization matrix:

From the two dimensions, you derive four priority levels, each associated with a maximum response time.

P1 (Immediate, within 24 to 48 hours): Critical vulnerability (CVSS 9+) in an exposed or business-critical system. Or any vulnerability on the CISA KEV list, regardless of CVSS score. Action is taken immediately, even outside regular maintenance windows. If a patch is not yet available, a workaround is implemented (e.g., take the system offline, disable the affected service, create a WAF rule).

P2 (High, within 7 days): Vulnerability with CVSS 7 or higher in an internal system with high criticality. Or medium vulnerability in an exposed system. The patch is applied in the next regular maintenance window, within one week at most.

P3 (Normal, within 30 days): Medium vulnerability in internal systems. The patch is applied in the regular monthly patch cycle.

P4 (Low, within 90 days): Low vulnerability or vulnerability in a system with low protection requirements. The patch is applied at the next scheduled maintenance.

These time targets must be documented in your patch management policy. The auditor will ask whether you have defined SLAs for patching and whether you meet them.

Phase 3: Test

Patches can have side effects. A Windows update can crash a legacy application. A firmware update can impair the performance of a network component. A Java update can break compatibility with a line-of-business application. That is why patches are tested before production rollout -- at least those that allow time for it.

For P1 patches (immediate patching), extensive testing is often not possible. Here you weigh the risk of patching against the risk of the unpatched vulnerability. In most cases, the risk of the open vulnerability far outweighs the patching risk, especially when it is being actively exploited.

For P2 and P3 patches, set up a test environment. It does not need to be an exact copy of production, but it should reflect your critical applications and configurations. At minimum, one test system per OS version on which you install the patches and then click through the key applications, run automated tests, or perform smoke tests.

In practice, a staged rollout has proven effective: first the test group (5 to 10 pilot users who report problems early), then after 2 to 3 days without complaints, rollout to the broader population.

Phase 4: Deploy

Deployment is the actual installation of patches on production systems. This is where automation tools come into play, which we cover in detail in the next section.

Ground rules for deployment:

Define maintenance windows: Server patches are ideally applied during a defined maintenance window, typically on weekends or in the evening. Client patches can be installed in the background during work hours, with a scheduled restart at lunch or at the end of the workday.

Create a rollback plan: Before patching, create a snapshot (for virtual servers) or a backup (for physical servers). If the patch causes problems, you can roll back to the previous state within minutes.

Communication: Inform affected users in advance about planned restarts or downtime. A brief email or a notification via the ticketing system is sufficient, but it must happen.

Documentation: Record which patch was installed on which system at what time. This information is essential for audits.

Phase 5: Verify

After deployment, verify that patches were successfully installed and that systems are functioning properly. Use multiple control mechanisms:

Patch compliance report: Your patch management tool generates a report showing which systems successfully installed the patch and which did not. Systems that did not receive the patch (offline, error, restart pending) are tracked.

Vulnerability scan: A follow-up vulnerability scan after deployment confirms that the vulnerability has actually been closed. Sometimes patch installation fails without generating an error message, and the vulnerability remains open.

Functional test: Key applications and services are tested for functionality after patching. Is the ERP running? Does email delivery work? Are network shares accessible?

Automation: Which tools work for mid-market companies

Manual patching works up to a certain company size, but beyond 50 workstations and a handful of servers, it becomes impractical without automation. Here is an overview of common tools for mid-market companies.

WSUS (Windows Server Update Services)

WSUS is the standard tool for Windows environments and is included in the Windows Server license. It enables centralized management of Microsoft updates for Windows clients and servers. You can approve, decline, and defer patches, define computer groups (pilot, production), schedule maintenance windows, and generate compliance reports.

WSUS has clear limitations: it can only patch Microsoft products. For third-party software like Adobe, Chrome, Java, or Zoom, you need an additional tool. The reporting is also rudimentary and the user interface dated. Nevertheless, WSUS is the pragmatic entry point for many SMEs because it incurs no additional licensing costs.

Microsoft Intune / Endpoint Manager

For organizations already using Microsoft 365 Business Premium or Enterprise, Intune is the logical next step. Intune manages not just Windows updates but also macOS, iOS, and Android. It offers feature updates, quality updates, driver updates, and ring-based rollout control through the Windows Update for Business mechanism.

The advantage over WSUS: Intune also works for devices outside the company network -- for remote workstations and mobile devices. The disadvantage: Intune is a cloud solution, which may be a concern for some organizations for compliance reasons.

Ansible / Puppet / Chef

For heterogeneous environments with Linux servers, network components, and various operating systems, configuration management tools like Ansible are a powerful option. Ansible is agentless, works over SSH, and can install patches on any system reachable via SSH.

A typical Ansible playbook for patch management updates package sources, installs all available security updates, restarts affected services, and writes the result to a log. The playbook can be scheduled and integrated into a CI/CD pipeline. The disadvantage: Ansible requires Linux expertise and initial setup work. It is not a click-and-done tool.

Commercial patch management solutions

Products like ManageEngine Patch Manager Plus, Ivanti Patch Management, SCCM (Microsoft Configuration Manager), or NinjaRMM offer a comprehensive solution for operating systems and third-party software in a single console. They come with ready-made patch catalogs, automate testing and rollout, and deliver the compliance reports auditors want to see.

For SMEs with limited IT staff, these solutions are often the best choice because they significantly reduce manual effort. Licensing costs typically range from 2 to 5 euros per endpoint per month, which is money well spent given the time savings.

Special cases: Legacy systems, OT, and firmware

Not everything can be patched easily. Some system categories require special attention.

Legacy systems

In almost every mid-market company, at least one system runs on an outdated operating system: the Windows Server 2012 machine running the old ERP version, or the Windows 7 workstation controlling a production machine. There are no regular patches for these systems.

The solution is not to ignore the problem but to implement compensating controls. Isolate the legacy system in its own network segment. Restrict access to the absolute minimum. Implement application whitelisting so that only known programs can execute. Monitor the system especially closely for anomalies. And plan the migration to a supported system, even if it requires time and budget. Document the risk assessment and compensating controls in the ISMS -- the auditor will ask about it.

Operational Technology (OT)

Production controllers, SCADA systems, and other OT components often cannot be patched during operations. Restarting a PLC means a production stoppage. Firmware updates for controllers sometimes require an on-site visit from the vendor. And some vendors even prohibit patches because they cannot guarantee the functionality of their systems if the operating system is modified.

For OT systems: segmentation is more important than patching. If you cannot patch an OT system, you must isolate it. A dedicated network segment with strict firewall rules, no direct internet access, and controlled data exchange through defined interfaces. Additionally, you should deploy OT-specific monitoring solutions that detect anomalies in network traffic without affecting the control systems.

Firmware

Firmware updates for network components (switches, firewalls, access points), printers, IoT devices, and server hardware (BIOS/UEFI, BMC) are frequently forgotten. They do not appear in standard patch management tools and require separate processes.

Create a list of all devices requiring firmware updates and regularly check (at least quarterly) the vendor websites for new firmware versions. Critical security updates for firewalls and exposed network components have the same priority as operating system patches. Firmware updates for printers or IoT devices can be applied in the regular quarterly cycle, provided no critical vulnerabilities are present.

Documentation for the audit

A functioning patch process that is not documented does not exist for the auditor. You need the following documents:

Patch management policy

The policy defines the process at the policy level: scope, roles and responsibilities, prioritization criteria, time targets (SLAs) per priority level, escalation paths, handling of exceptions, testing procedures, and reporting. This policy is approved by the ISM or CISO and reviewed regularly.

Patch inventory and compliance reports

Regular (ideally monthly) reports on the patch status of all systems: how many systems are fully patched? How many have open critical vulnerabilities? What is the average time-to-patch? Which systems have exceptions? These reports feed into the management review and show the trend over time. In ISMS Lite, the patch compliance status can be tracked as a metric directly in the dashboard and exported as audit evidence.

Exception register

Not every system can be patched immediately. For each exception (legacy system, vendor restriction, compatibility issue), you document: affected system, vulnerability, reason for the exception, compensating controls, planned end date of the exception, responsible party, and approval. Exceptions without an expiration date and without compensating controls are a problem in an audit.

Evidence of individual patch cycles

For each patch cycle, you record: which patches were identified, how they were prioritized, whether and how they were tested, when they were rolled out, on which systems, and whether verification was successful. This sounds like a lot of effort, but if you use a patch management tool, it generates most of this information automatically.

Metrics for patch management

To manage your patch process and demonstrate its effectiveness, you need metrics. The following KPIs are practical for mid-market companies:

Patch compliance rate: Percentage of systems that have installed all relevant patches. Target: over 95 percent. Systems with documented exceptions count as compliant if compensating controls are documented and implemented.

Mean Time to Patch (MTTP): Average time between a patch being published and its installation. Measure separately by priority level. MTTP for P1 patches should be under 48 hours; for P3 patches, under 30 days.

Number of open critical vulnerabilities: How many vulnerabilities with CVSS 9 or higher are currently unpatched? This number should ideally be zero. Every open critical vulnerability needs a documented rationale and a timeline.

Exception rate: Percentage of systems with active patch exceptions. If this rate keeps rising, it points to a structural problem (e.g., too many legacy systems, insufficient testing capacity).

First-attempt success rate for patch rollouts: Percentage of patches that installed successfully on the first attempt. A low rate points to issues with the test environment, network connectivity, or client configurations.

Common mistakes in patch management

Even with a defined process, there are typical pitfalls.

Patching only Windows: Microsoft patches are relatively easy to manage thanks to WSUS and Intune. But what about the Linux servers, the network components, the phone system, and third-party applications? A patch process that covers only Windows has blind spots that attackers readily exploit.

No rollback plan: Applying patches without a prior backup or snapshot is playing Russian roulette. Sooner or later, a patch will go wrong, and without a rollback option, production is down until the problem is resolved manually.

Lack of follow-through: Patches are approved and released, but nobody checks whether they actually arrived on all systems. Systems that were offline during rollout, outdated notebooks at home, servers in the DMZ unreachable by the internal WSUS. Without verification, these gaps go undetected.

Fear of patching: Some administrators defer patches because they fear negative side effects. This fear is understandable, but the alternative -- leaving a known vulnerability open -- is riskier in almost all cases than the patch itself. A defined testing process and a rollback plan address this fear by making the patching risk manageable.

Patch management without an asset inventory: If you do not know which systems you have, you cannot ensure they are all patched. Comprehensive vulnerability management always requires a current inventory. The IT asset inventory is the mandatory prerequisite for effective patch management. Every system not in the inventory falls through the cracks.

Patch management as a continuous process

Patch management is not a project with a beginning and an end. It is a continuous process that runs as long as your organization operates IT systems. Every month new vulnerabilities appear, every month patches must be prioritized, tested, and deployed. That is why automation is so important: only with automated tools and defined processes can this cycle be sustained long-term without overwhelming the IT team.

The start does not need to be perfect. If you have no structured patch management today, begin with the obvious: centralize Windows updates via WSUS or Intune, establish a monthly patch cycle, and prioritize critical vulnerabilities. In the second step, add Linux servers and network components. In the third step, implement vulnerability scanning and compliance reporting. In the fourth step, automate third-party patches.

With each step, your patch management matures, your risk decreases, and your audit evidence becomes more compelling. The goal is not perfection on day one but a continuously improved process that fits your organization and is actually practiced.

Further reading

Start with the Windows updates -- they make up the largest share and are the easiest to automate. Once this foundation is in place, work your way toward the special cases and build out your process step by step.

Track patch management with ISMS Lite

ISMS Lite helps you document your patch process, track open vulnerabilities, and provide evidence to auditors and NIS2 examiners.

Install now