Patch Tuesday is not a strategy

"We patch every Tuesday" sounds reassuring. Until you ask which patches, on which systems, with what verification, and what happens when one of them breaks something.

What real coverage includes

  1. An inventory you trust. You cannot patch what you do not know about.
  2. A schedule with a defined latency target. Critical CVEs in 7 days. High in 14. Everything else in 30.
  3. A test ring. Not every patch ships clean. A pilot group catches the bad ones before they hit production.
  4. A rollback plan. When a patch does break something, what does the unwind look like?
  5. Reporting. Compliance frameworks expect evidence. Auditors expect numbers, not assurances.

The application gap

Most patching focuses on the OS. The third-party apps your team actually uses, like PDF readers, browsers extensions, accounting software, are often the bigger risk. They live outside Windows Update and need their own coverage.

Related posts.