Lesson 36 of 60 intermediate

Patching, Vulnerability Mgmt & Baselines

Prevention is boring but hireable

Open interactive version (quiz + challenge)

Real-world analogy

Patching is brushing teeth for your fleet. You won’t see the benefit each morning. You’ll see the consequences years later in a dental chair or a press release.

What is it?

Vulnerability management + patching + baselines is the largest portion of real defensive work. It’s unglamorous. It’s what actually keeps organizations out of the news.

Real-world relevance

A new critical vulnerability in a widely-used library hits the CISA KEV list. You query vulnerability scan reports for affected assets, identify 12 servers, raise emergency changes, patch 9, apply compensating controls to 3 (isolated legacy apps), and report progress daily. No incident, no headlines.

Key points

Code example

// Monthly patch cycle (simplified)

Week 1:
  - Review vendor advisories (MSRC, RHSA, vendor blogs)
  - Pull vulnerability scan results
  - Score with CVSS + exploit status (CISA KEV, EPSS)
  - Propose patch batch and exceptions for the month

Week 2:
  - Approve batch in CAB (Change Advisory Board)
  - Deploy to test ring (dev + pilot users)
  - Collect telemetry (crashes, regressions)

Week 3:
  - Roll to staging ring
  - Validate critical apps still function
  - Decide go/no-go for production

Week 4:
  - Production rollout in approved windows
  - Post-patch verification
  - Update asset inventory + vulnerability dashboards
  - Close tickets with KB references

Line-by-line walkthrough

  1. 1. Monthly cycle heading
  2. 2. Week 1 — intel + scoring
  3. 3. Vendor advisories
  4. 4. Scan results
  5. 5. Score with CVSS + exploitability
  6. 6. Propose batch + exceptions
  7. 7. Blank separator
  8. 8. Week 2 — test ring
  9. 9. CAB approval
  10. 10. Pilot deployment
  11. 11. Telemetry collection
  12. 12. Blank separator
  13. 13. Week 3 — staging
  14. 14. Staging deployment
  15. 15. App validation
  16. 16. Go/no-go decision
  17. 17. Blank separator
  18. 18. Week 4 — production
  19. 19. Rollout in windows
  20. 20. Post-patch verification
  21. 21. Inventory + dashboards
  22. 22. Ticket close with KB

Spot the bug

Policy: 'Patch only when something breaks. Speed matters, process is for bureaucrats.'
Need a hint?
Which classic risk does this maximize?
Show answer
Exploitation of known, patchable vulnerabilities. The absence of a process means no test, no rollback, no audit trail, and high outage risk. Replace with: monthly cycle + emergency process for critical/KEV items + approvals + verification + reporting.

Explain like I'm 5

Patching is boring. Breaches are exciting but painful. Choose boring. Most attackers only break in through doors you forgot to close.

Fun fact

Equifax’s 2017 mega-breach exploited a vulnerability with a patch that had been publicly available for 2 months. The technical fix was simple; the process discipline to apply it was missing.

Hands-on challenge

On a VM: run a scanner (OpenVAS or a trial of Nessus/Defender Vulnerability Management). Identify the top 5 findings, write a short prioritization note using CVSS + exploitability + exposure.

More resources

Open interactive version (quiz + challenge) ← Back to course: IT Jobs Bootcamp