Skip to content

3.14.1 — Patch Your Systems

Identify, report, and correct system flaws in a timely manner.

You need a complete patch management lifecycle — not just “we patch when we can.” Three phases, each with defined timeframes:

  1. Identify. You have a process and schedule for discovering flaws — vulnerability scans, vendor advisories, CISA KEV catalog monitoring. The assessor will ask: “How often do you scan?” and “How soon after a flaw is published do you know about it?” Your policy defines the frequency — weekly scans is standard, daily for internet-facing systems.

  2. Report. Identified flaws are assessed for severity and reported to the people responsible for remediation. Not buried in a scan report nobody reads — actively triaged, prioritized, and assigned. Critical flaws escalated immediately.

  3. Correct. Patches are applied within defined timeframes based on severity. Industry standards for DIB:

    • Critical/CISA KEV: 48–72 hours
    • High: 14 days
    • Medium: 30 days
    • Low: 90 days or next maintenance window

The assessor will compare your vulnerability scan results against your patching records. If a scan from two months ago shows a critical vulnerability and this month’s scan shows the same vulnerability still present, that’s a finding — regardless of how good your policy looks.

This covers everything: operating systems, applications, firmware, network devices, and cloud services. Patching just Windows and ignoring third-party apps, firmware, or cloud configurations is incomplete.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is the timeframe for identifying system flaws specified?Policy defines scan frequency and flaw discovery SLAs
2Are system flaws identified within that timeframe?Scan results showing regular execution per the defined schedule
3Is the timeframe for reporting system flaws specified?Policy defines how quickly identified flaws are triaged, prioritized, and assigned
4Are system flaws reported within that timeframe?Triage records showing flaws assessed and assigned per the SLA
5Is the timeframe for correcting system flaws specified?Policy defines remediation SLAs by severity: critical, high, medium, low
6Are system flaws corrected within that timeframe?Patching records showing remediation within SLAs — validated by follow-up scans

Documents they’ll review: System and information integrity policy; patch management procedures; vulnerability scan results (recent and historical); patching records; list of system flaws and remediation status; CISA KEV tracking; system security plan; change control records for patch deployment

People they’ll talk to: System or network administrators; information security personnel; personnel responsible for patch management; personnel configuring and maintaining systems

Live demos they’ll ask for: “Show me your most recent vulnerability scan results.” “Show me your patching schedule and records.” “Pick a critical vulnerability from last quarter — when was it identified and when was it patched?” “Show me CISA KEV items and your response.”


These are the actual questions. Have answers ready.

  • “What is your defined timeframe for identifying system flaws? Show me the policy.”
  • “Show me your most recent vulnerability scan. When was it run?”
  • “Pick a critical flaw from the last scan — how quickly was it patched?”
  • “Do you track CISA Known Exploited Vulnerabilities? Show me.”
  • “What’s your patching SLA for critical vs. high vs. medium?”
  • “Are third-party applications patched, or just the OS?”
  • “Show me firmware patching records for your network devices.”

No defined schedule. Patching happens “when we get to it.” The assessor asks for your patching SLA and there isn’t one. Define severity-based timeframes in your policy and stick to them.

Critical patches delayed. A critical vulnerability sits unpatched for weeks because change management moves slowly. Emergency changes exist for a reason — critical flaws bypass normal scheduling. Define an expedited path for critical patches.

Incomplete coverage. Windows gets patched but third-party applications (Java, Adobe, Chrome, Zoom) don’t. Firmware on firewalls and switches hasn’t been updated in years. Cloud configurations aren’t scanned. Your patching program must cover all system components.

No validation. Patches are deployed but nobody verifies they were applied successfully. A patch that failed to install on three workstations doesn’t count as remediated. Run follow-up scans to validate.

Scan without action. Vulnerability scans run weekly but the results sit unreviewed. The scan is the identification step — without triage, assignment, and remediation, you’ve identified flaws but not reported or corrected them.



RequirementWhy it matters here
3.14.3 — Act on AdvisoriesSecurity advisories feed the flaw identification process
3.11.2 — Scan for VulnerabilitiesVulnerability scanning is the identification mechanism for this requirement
3.4.3 — Control Every ChangePatches are changes that go through change management
3.4.2 — Harden EverythingPatching maintains the security baseline established in hardening

Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.


CMMC Practice ID: SI.L2-3.14.1 | SPRS Weight: 5 points | POA&M Eligible: No