UCF STIG Viewer Logo

The application server must install security-relevant software updates within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs).


Overview

Finding ID Version Rule ID IA Controls Severity
V-57561 SRG-APP-000456-AS-000266 SV-71837r2_rule Medium
Description
Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes) to production systems after thorough testing of the patches within a lab environment. Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling must also be addressed expeditiously.
STIG Date
Application Server Security Requirements Guide 2019-01-07

Details

Check Text ( C-58269r1_chk )
Review the application server documentation and configuration to determine if the application server checks with a patch management system to install security-relevant software updates within a timeframe directed by an authoritative source.

If the application server does not install security-relevant patches within the time period directed by the authoritative source, this is a finding.
Fix Text (F-62629r1_fix)
Configure the application server to use a patch management system to ensure security-relevant updates are installed within the time period directed by the authoritative source.