Ensure network infrastructure is kept up-to-date. Example implementations include running the latest
stable release of software and/or using currently supported network as a service (NaaS) offerings.
Review software versions monthly, or more frequently, to verify software support.
The organization regularly conducts a vulnerability scan, which searches for vulnerabilities found on computers, workstations, mobile devices, networks or applications. It is important to scan even after significant changes.
It should be noted that vulnerable source code can be from operating system software, server applications, user applications, as well as from the firmware application as well as from drivers, BIOS and separate management interfaces (e.g. iLo , iDrac). In addition to software errors, vulnerabilities occur from configuration errors and old practices, such as the use of outdated encryption algorithms.
The organization has to make sure that all licensed software are updated with in 14 days of the update coming live when:
Software updates should have a management process in place to ensure that the latest approved patches and application updates are installed on all approved software. Earlier versions of software should be retained as a precaution.