Version: V5
Ratified by: Finance & Investment Committee
Date ratified: 03/04/2024
Job Title of author:
Assistant Director – IT & Systems
Reviewed by Committee or Expert Group Technology Programme Group
Equality Impact Assessed by:
Related procedural documents
Assistant Director – IT & Systems
ITPOL05 – IT Software Management Policy
Review date: 03/04/2027
It is the responsibility of users to ensure that you are using the most up to date document template – i.e. obtained via the intranet
In developing/reviewing this policy Provide Community has had regard to the principles of the NHS Constitution.
Version Control Sheet
Version Date Author Status Comment DRAFT 23/11/14 Head of IT & Data DRAFT To be agreed by TPB
1.0 14/12/14 Head of IT & Data Approved Approved by TPB
2.0 17/01/17 Head of IT & Data Updated Approved by TPB
3.0 05/02/2019 Head of IT & Data No approved Minor updates and new patch Tuesday dates added
4 02/01/2020
5 02/01/2024
Assistant Director –IT & Systems Approved by FRC in October 2020 Updates to patch dates
Assistant Director –IT & Systems Version Approved Approved by Technology Programme Group
1. Introduction
Security vulnerabilities within computer systems, applications, and network hardware pose significant risks, including potential data loss or the introduction of viruses and malicious software into the network. To mitigate these risks, software manufacturers release patches that address security vulnerabilities and bolster defences against emerging threats. This policy primarily focuses on Microsoft Patching due to its wellestablished and predictable release cycle; however, the principles outlined herein apply universally to the patching of all systems maintained by Provide.
2. Purpose
The primary objective of this policy is to guarantee that all computers connecting to Provide's infrastructure are equipped with up-to-date virus protection software, the latest virus definition libraries, and the most recent updates for operating systems and security patches. This ensures a secure and resilient computing environment, safeguarding against vulnerabilities and threats, thereby maintaining the integrity, availability, and confidentiality of our systems and data.
3. Benefits
The successful enforcement of this policy is designed to ensure that patches are applied promptly, thereby maintaining the availability, security, and compliance of our systems with key standards and legal requirements, including:
• Data Protection Act 2018
• Computer Misuse Act 1990
• General Data Protection Regulation (GDPR)
• ISO 27001:2013 - ISO/IEC 27001 Information Security Management
• Cyber Essentials Scheme - Cyber Essentials Scheme Overview
Implementing stringent IT policies and procedures not only enhances the reliability and security of our operations but also builds a strong foundation of trust among our department, commissioners, and both existing and potential clients. This structured approach to change management signifies our commitment to excellence and adherence to best practices in information security.
4. Scope
This policy encompasses all personnel working for or on behalf of Provide and its subsidiary companies, including individuals who connect any device to the Provide internal network. It covers all IT hardware owned or leased by Provide, including but not limited to servers, desktop computers, laptops, tablets, Internet of Things (IoT) devices, medical devices, and network equipment.
The guidelines outlined in this document pertain to all software utilised within Provide, such as:
• Operating Systems
• Endpoint BIOS and Firmware
• Networking Firmware
• Server Applications
• Desktop Applications
• Smartphone Applications
5. Patch Management principles
To maintain the highest level of security and functionality, all devices and software within our environment are updated as soon as possible. To achieve this, we use various tools and technologies. Below are the principles applied to each device type within the environment. Regardless of the risk score of the patch, all patches are deployed and installed without delay.
Laptops/Desktops:
Patches are distributed and applied automatically as they are released. Devices start installing required updates upon activation, with users allowed an 8-hour window to reboot. This period may be shortened in exceptional circumstances by the Technology Operations Manager, depending on risk and impact.
Servers:
Patches are applied on the release day within designated server maintenance windows. Timing may vary based on the risk and potential impact of vulnerabilities.
Windows Server Patching: Managed using the same tools as laptops and desktops.
Linux Server Patching: Conducted manually during the server maintenance windows.
Network Infrastructure:
Updates are automatically scheduled and executed by the Infrastructure Team to minimise impact, tailored to the specific requirements of each site.
Mobile Phones and Tablets:
Managed through Mobile Device Management (MDM) tools, enforcing policies to install the latest stable builds and app updates as soon as available.
BYOD mobile devices are excluded from this policy
Non-Provide managed devices:
Devices not managed by the IT team that are connected to provide networks in any way must conform with Cyber Essentials as defined below.
“Patched within 14 days of an update being released, where the patch fixes a vulnerability with a severity the product vendor describes as 'critical' or 'high risk'.*
Some vendors release patches for multiple issues with differing severity levels as a single update. If such an update covers any 'critical' or 'high risk' issues, then it must be installed within 14 days.
*If the vendor uses different terms to describe the severity of vulnerabilities, see the precise definition in the Common Vulnerability Scoring System (CVSS).”
6. Non-compliance and patching errors
Updates commence upon device startup. Devices not meeting update compliance are monitored, and their users are assisted by the Cyber Security or Service Desk teams to ensure updates are applied. Non-compliant devices may be temporarily isolated from the network until compliance is achieved.
Widespread errors
Should any update cause widespread errors or break functionality of systems then the patch deployment will be ceased and affected devices rolled back to their previous state until a resolution or workaround has been implemented before redeployment.
Non-Provide managed devices
These devices, if non-compliant, are not isolated but may be subject to risk mitigation measures. Non-compliance will prompt contact from Provide’s cyber security team to supplier account management or technical teams for resolution, potentially escalating to the contracts and legal team if necessary.
7. Tools and technologies
Windows Updates Deployment:
Windows updates are managed through a combination of SCCM (System Center Configuration Manager) and a local PowerShell script (PSWindowsUpdate). SCCM ensures timely deployment of Microsoft and 3rd party updates, while the PSWindowsUpdate script facilitates daily update checks directly from Microsoft. This dual approach ensures comprehensive coverage and efficient patch management.
Update Distribution:
Daily updates sourced from PatchMyPC and Microsoft are deployed by SCCM to all applicable client devices within our network. Additionally, Windows 10 and 11 devices run a local PowerShell script hourly to obtain updates directly from Microsoft, minimizing the risk of a single point of failure. Similarly, server operating systems execute a local PowerShell script on the second Wednesday and Thursday of each month, retrieving updates directly from Microsoft to bolster reliability.
Hardware Related Updates:
Device drivers, BIOS firmware, and other hardware-related updates are applied during device logon using Dell Command Update. This ensures that our systems remain up to date with the latest hardware enhancements and fixes.
Update Monitoring and Response:
Monitoring of updates is carried out through Microsoft Defender for Endpoint (MDE) and LanSweeper. These tools provide visibility into newly released updates and track their installation status across devices. Any instances of updates failing to install are promptly investigated by our Infrastructure team, who deploy fixes as soon as possible to maintain system integrity.
Cybersecurity Alert Handling:
The Infrastructure team receives Cyber Alerts and CareCERTs from NHS England, highlighting critical vulnerabilities that demand immediate attention. Additionally, a weekly roundup of top vulnerabilities is provided to stay proactive in addressing potential security risks.
8. Roles and Responsibilities
To enable the Patch management policy to work effectively, staff at all levels within Provide will need to play their part, some of the key responsibilities are listed below:
8.1. Chief Officers
• Ensuring procedures are in place within their directorates to ensure staff are aware of their responsibilities contained within this policy and that these responsibilities are adhered to.
8.2. Director – IT & Systems
• Implementation and regular review of this policy.
• Leading investigations into reported breaches of this policy.
• Ensuring appropriate software licences are held by Provide.
8.3. Technology Operations Manager
• Ensuring that the list of pilot devices is up to date and that the testers using these devices understand that it is an important part of their role to feedback to the Provide Technology Team.
• Responsible for liaising with any 3rd party suppliers and system owners to ensure compatibility of patches against non-core systems.
• Ensuring that an appropriate level of documentation is kept so that decisions made in relation to releasing patches (or not releasing) is of a high standard and can be audited if required.
• Ensuring the Infrastructure Team fully execute their responsibilities in an effective and efficient manner.
8.4. Line Managers
• Ensuring that their staff have received appropriate training relating to Information Security and the use of IT Systems.
• Ensuring their staff have read and understood this policy.
8.5. All Staff
• Should be aware that there may be a temporary impact to network and PC performance during the patch deployment.
• Must ensure all desktops, laptops and tablets issued to them are regularly connected to the Provide network.
• Responsible for contacting the Technology Service Desk to report problems at the earliest opportunity.
• Adherence to the organisation’s IT related policies
• Ensuring IT equipment is used in an appropriate manner and only for work purposes.
8.6. Infrastructure Team
• Patch management implementation.
• Ensuring all known and reasonable precautions are in place to reduce network vulnerabilities while keeping the network operating.
• Ensuring that the business is aware of the dates that patches are to be released.
8.7. Technology Team
• Ensuring that all Technology staff are familiar with this policy.
• Each member of the Technology department is responsible for the accuracy of the data they enter into Provide’s IT systems and databases.
• Ensuring that high quality advice and guidance in relation to patch management is provided.