
Patch management is the process of identifying, testing, deploying, verifying, and documenting software and firmware updates. In 2003, New Boundary Technologies selected St. Bernard Software's UpdateEXPERT technology for inclusion in the Prism family of products. The announcement reflected a problem every administrator recognized after worms such as Blaster: networks could not be kept secure by manually researching, downloading, and installing every hotfix, service pack, and vendor update.
That basic problem has become a larger discipline. Modern patch management is part of vulnerability management, asset management, configuration management, endpoint management, cloud operations, software supply-chain risk, and incident response. The question is no longer only "Which machines are missing patches?" It is "Which exposed, exploitable, business-critical weaknesses must be fixed first, and how do we prove they are fixed without breaking the business?"
The 2003 Context
The original Prism and UpdateEXPERT story described software that could evaluate missing and out-of-date patches across networked computers, discover applicable updates, and deploy them through a central console. It also emphasized testing for interdependencies and compatibility. That remains the heart of patch management: find what is missing, understand what applies, deploy reliably, and validate the result.
What changed is scale and diversity. Enterprises now patch Windows, macOS, Linux, mobile devices, browsers, office suites, databases, hypervisors, containers, Kubernetes components, network devices, firewalls, VPN gateways, storage arrays, SaaS integrations, firmware, open-source dependencies, and cloud images. Some assets are always online, some are remote, some are ephemeral, and some are too fragile to patch without a maintenance plan.
Asset Inventory Comes First
No patch program works without accurate asset inventory. Teams need to know what they own, where it is, who is responsible for it, what software and firmware it runs, whether it is exposed to the Internet, what data it handles, and how critical it is to the business. Missing assets are where patch programs quietly fail.
Inventory should cover endpoints, servers, virtual machines, containers, cloud workloads, network appliances, OT and IoT devices, development tools, third-party applications, and externally hosted services. It should also include ownership and lifecycle status. An unsupported system that cannot be patched is not an exception; it is a risk that needs compensating controls and a retirement plan.
Risk-Based Prioritization
Patch queues are always larger than maintenance windows. Risk-based prioritization helps teams decide what to fix first. CVSS can describe technical severity, but it is not enough by itself. Exploitation in the wild, Internet exposure, asset criticality, available mitigations, exploit automation, business impact, and mission context all matter.
CISA's Known Exploited Vulnerabilities catalog is especially useful because it identifies vulnerabilities with evidence of exploitation in the wild. CISA's Stakeholder-Specific Vulnerability Categorization methodology helps organizations make response decisions based on factors such as exploitation status, technical impact, automatability, mission prevalence, and public-wellbeing impact. Those inputs help convert a long vulnerability list into action.
Testing, Rings, And Rollback
Fast patching and safe patching are not enemies, but they require structure. A mature program uses deployment rings: lab systems, pilot users, early production groups, broad production, and finally sensitive or high-availability systems with special change windows. The exact rings depend on the environment, but the principle is the same: learn quickly on representative systems before pushing everywhere.
Rollback planning is part of patch planning. Teams should know how to uninstall or supersede a patch, restore a snapshot, redeploy an image, roll back a container, fail over a cluster, or use a vendor mitigation if the update causes a major problem. Backups and configuration exports should be verified before patching systems that cannot be rebuilt easily.
Endpoints, Servers, And Cloud Workloads
Endpoint patching focuses on broad coverage and user disruption. Laptops may be off-network, asleep, traveling, or managed by different tools. Browser and office-suite patches can be as urgent as operating-system updates because users live in those applications. Mobile devices add app-store, OS, and device-management constraints.
Server patching requires more dependency awareness. Databases, middleware, clusters, storage drivers, backup agents, monitoring agents, and security tools can all interact with operating-system updates. Cloud workloads add image pipelines, autoscaling groups, container base images, managed-service patch windows, serverless runtimes, and infrastructure-as-code drift. In many cloud designs, rebuilding from a patched golden image is safer than patching long-lived instances in place.
Network And Security Appliances
Network devices and security appliances deserve special attention because they are often Internet-facing and highly privileged. Firewalls, VPN concentrators, ADCs, SBCs, routers, wireless controllers, storage arrays, and management platforms have repeatedly appeared in exploited-vulnerability campaigns. Patching them can require failover testing, configuration backups, license checks, HA pair coordination, and vendor-specific upgrade paths.
Do not let appliance patching sit outside the vulnerability-management program because it is owned by a different team. Exposed infrastructure should be prioritized by exploitability and business impact, not organizational boundaries.
Supply Chain And SBOMs
Modern patch management includes third-party and open-source dependencies. A vulnerability in a library may exist inside a commercial product, a container image, a development tool, or an internally built application. Software bills of materials can help organizations determine where vulnerable components are used, but an SBOM is only useful if it is connected to inventory, vulnerability data, ownership, and remediation workflows.
For internal software, patching may mean updating dependencies, rebuilding images, retesting, redeploying, and confirming that the vulnerable component is no longer present in production. For vendor software, it may mean tracking advisories, applying fixed releases, or using temporary mitigations until a patch is available.
Verification And Metrics
Deployment success is not the same as risk reduction. A patch job can report success while a device remains vulnerable because it did not reboot, the wrong package was installed, the vulnerable service still runs, or a superseded component remains on disk. Verification should include scanner confirmation, endpoint inventory, version checks, configuration checks, and targeted validation for critical vulnerabilities.
Useful metrics include coverage by asset class, time to remediate known exploited vulnerabilities, overdue critical patches, failure rate by patch ring, unsupported assets, reboot debt, Internet-facing exposure, and exception aging. Metrics should drive action, not become a monthly ritual detached from real risk.
Operational Guidance
A practical patch-management program should include:
- Continuously maintained asset inventory with owners and criticality.
- Automated discovery of missing operating-system, application, firmware, and dependency updates.
- Risk prioritization using exploitation evidence, exposure, business impact, and frameworks such as CISA KEV and SSVC.
- Deployment rings, maintenance windows, and emergency patch procedures.
- Rollback plans and tested backups for critical systems.
- Exception handling with expiration dates, compensating controls, and executive visibility for long-term risk.
- Verification through scans, version checks, logs, and targeted tests.
- Integration with change management, incident response, endpoint management, cloud pipelines, and vulnerability management.
The New Boundary and St. Bernard partnership was about easing the administrator's pain when patching became too frequent and too important to handle manually. In 2026, that is still the mission, but the scope is broader. Effective patch management is preventive maintenance for technology, a vulnerability response discipline, and one of the most practical ways to reduce real-world security risk.
References
- ITNinja: New Boundary Technologies and St. Bernard UpdateEXPERT announcement
- NIST SP 800-40 Rev. 4: Guide to Enterprise Patch Management Planning
- CISA: Known Exploited Vulnerabilities catalog
- CISA: Stakeholder-Specific Vulnerability Categorization
- CISA: SSVC calculator
- CISA: Vulnrichment CVE enrichment
- CISA: incident and vulnerability response playbooks