COI Report – Part VII
Page
378 of
425 (a) Simulate test cases and check if the patches are getting deployed successfully on the target platforms b) Compare application performance before and after the patch deployment and check if there are any issues c) Test if other applications running on the target environment are impacted by the patch updated) Ensure that if the
patch is successfully removed, no application or system issues will occur and e) Incorporate patch testing as part of IT security risk assessment plan.
1099. There should be clear and stringent patch testing timelines, and a means to ensure that these timelines are adhered to.
1100. In addition to identifying any unintended problems, patches themselves should ensure that they have fully addressed the vulnerability in question or corrected the performance issue as intended.
1101. If it is not feasible
to install the patch because, for example, testing results show that the patch will crash or seriously disrupt the production system,
alternate security controls should be implemented and monitored for signs of the unpatched system being exploited.
1102. The Committee notes that MOH is committed to ensure that patches are effected in a timely way which minimises cybersecurity and operational risks.
Share with your friends: