UCF STIG Viewer Logo

The operating system must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).


Overview

Finding ID Version Rule ID IA Controls Severity
V-259333 SRG-OS-000439-GPOS-00195 SV-259333r942478_rule Medium
Description
Security flaws with operating systems are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes). Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling must also be addressed expeditiously.
STIG Date
General Purpose Operating System Security Requirements Guide 2023-12-01

Details

Check Text ( C-63072r939262_chk )
Review the operating system documentation and configuration to determine if the operating system checks with a patch management system to install security-relevant software updates within a timeframe directed by an authoritative source.

If the operating system does not install security-relevant patches within the time period directed by the authoritative source, this is a finding.
Fix Text (F-62980r939263_fix)
Configure the operating system to use a patch management system to ensure security-relevant updates are installed within the time period directed by the authoritative source.