CDP 35948473: Implement Patching Process (app/AI) #6
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CDP Control ID:
35948473Category: Patching
Frequency: Biannually
Owner: h.noerenberg
Parent: #1
Requirement & Guidance
Patching Requirement: Patch vulnerabilities. Develop, document and implement a patching schedule and timeframe in accordance with your terms and conditions of your contract, and seek written client sign off of schedules. Documenting Engagement Level Procedures is requiredAttachment(s) RequiredGuidance: Install security patches as per the agreed patching schedule. If you have specific timeframes in your contract, you must follow them and you may use the signed contract as client sign-off, otherwise you must obtain written client approval for your current patching schedule, timeframe and process that takes into account the specific client circumstances and SANS patching standards, including but not limited to: the current state of client infrastructure, technology platforms involved, availability of automated tools, number of infrastructure devices being managed, regular vendor patching release timelines, etcAttach to this control the patching schedule and timeframe and the process that has been formally signed off by the client. Additional information regarding the patching process can be set in the engagement level procedure.For application development work: Seek contractual requirements to determine who is responsible for patching the backend, comply with this requirement when it's in scope for Accenture (e.g: Applications coded over pre-packed software)Patch ManagementSecurity Remediation and Patch Management Standard
CapaKraken Action Plan — 35948473 Patching Process
Scope: Security-Patches für alle Dependencies + OS / Container / Node / Postgres.
Aktueller Stand:
docs/acn-security-compliance-status.md3.2.2.7.01 PARTIAL — Dependabot + npm audit in CI/api/cron/security-auditnode:20-bookworm-slim(Dockerfile.prod)Todos:
docs/patching-policy.md(neu) mit SLA + Renovate/Dependabot-Konfigpostgres:16/redis:7)pnpm audit --audit-level=highfails the buildDateien:
Dockerfile.prod,.github/workflows/ci.yml,packages/api/src/router/cron.ts(security-audit)CapaKraken Compliance-Status
EAPPS-Mapping:
Patch Management StandardStatus: 🟡 PARTIAL / TODO — konkrete Schritte unten
Zusammenfassung
Dependabot +
pnpm auditin CI sind aktiv. Formaler Patch-SLA fehlt noch.Aktuelle Evidenz
.github/workflows/nightly-security.ymlpnpm audit --audit-level=highin CI (blockiert bei High/Critical).github/dependabot.ymlOffene Aufgaben
docs/acn-standards-applicability.md#8).docs/patch-management.mdmit Rolle, Trigger, Eskalationspfad.Ticket bleibt offen bis alle Aufgaben abgehakt sind.
Action Plan
CDP-Requirement: Patching-Schedule dokumentieren + durchsetzen, mit Client-Sign-off (hier: intern).
Status
.github/workflows/nightly-security.yml(pnpm audit --audit-level=high, Cron17 2 * * *)..github/dependabot.yml.TODOs — Patching-Policy dokumentieren
Neu anlegen:
docs/patching-policy.mdmit:Coverage:
docker build --pull)docker compose pull)Client-Sign-off: Intern — Hartmut als Projekt-Owner dokumentiert in Policy-File.
Frequency: Biannual review.