Patch, Change, and Configuration Management

Key Takeaways

  • Patch management applies updates to reduce known vulnerabilities while controlling operational disruption.
  • Change management evaluates risk, approval, testing, scheduling, rollback, and communication.
  • Configuration management maintains approved secure states and detects drift from baselines.
  • Emergency changes still need documentation, testing where feasible, and post-implementation review.
  • Rollback plans and maintenance windows reduce the business impact of failed changes.
Last updated: April 2026

Patch, Change, and Configuration Management

Patch management, change management, and configuration management are connected security operations processes. Patching removes known defects. Change management controls how modifications reach production. Configuration management defines and maintains the approved secure state.

Patch Management Flow

StepExample
Identify updateVendor releases security update for web framework
Assess applicabilityDetermine which applications use the affected version
PrioritizeRaise priority for internet-facing or sensitive systems
TestApply in staging and run smoke tests
Approve changeBusiness and technical owners approve window
DeployPatch during maintenance window or emergency process
VerifyConfirm version, service health, and vulnerability scan status
DocumentRecord systems patched, exceptions, failures, and next actions

Patch management must balance security urgency against availability. Delaying a critical exploited patch can expose the organization. Deploying a poorly tested patch to a fragile production system can also harm the business.

Change Types

Change typeDescriptionExample
StandardPreapproved, low-risk, repeatableMonthly workstation patch deployment
NormalRequires review and approvalUpgrade database version on production cluster
EmergencyUrgent change to reduce immediate risk or restore serviceApply firewall rule to block active exploitation

Emergency does not mean undocumented. It means the review is accelerated, with appropriate approvals, implementation notes, and post-change review.

Configuration Baselines and Drift

A secure baseline is an approved configuration state. It may define password policy, logging settings, encryption requirements, disabled services, firewall rules, endpoint protection, and audit options. Configuration drift occurs when a system moves away from the approved state.

Baseline itemDrift exampleRisk
Full disk encryption enabledEncryption disabled for troubleshootingLost device could expose data
Endpoint logging enabledAgent stopped or removedReduced detection and investigation capability
SSH root login disabledRoot login enabled for convenienceIncreased brute-force and accountability risk
TLS 1.2 or newer requiredLegacy protocol reenabledWeak encryption exposure

Worked Decision Example

A vendor releases a patch for a critical flaw in a payment application. The application is business-critical, internet-facing through an API gateway, and processes confidential customer data. Testing shows the patch breaks one optional reporting screen but core payment flow works.

Reasonable decision:

IssueDecision
Security urgencyHigh because the application is exposed and sensitive
Business impactCore payment remains functional
Change typeEmergency or expedited normal change
Compensating controlsIncrease monitoring and restrict suspicious request patterns
RollbackPrepare prior package and database backup plan
Follow-upFix reporting screen after risk-reducing patch is deployed

The organization should not ignore the broken reporting screen, but the security and business context support rapid patching with documented residual issues.

Operational Decision Rules

SituationBest operational response
Critical patch fails testingUse compensating controls, document exception, continue remediation planning
Emergency fix deployedComplete post-implementation review and update records
Baseline drift detectedInvestigate whether change was approved, then remediate or document exception
Unsupported system cannot be patchedIsolate, monitor, replace, or formally accept risk with owner approval
Patch window missed repeatedlyEscalate aging risk and ownership, not just reschedule silently

Common Traps

  • Applying patches without a rollback plan for critical systems.
  • Treating change control as paperwork instead of risk management.
  • Allowing emergency changes to bypass all records.
  • Fixing software versions while leaving insecure configuration drift in place.
  • Failing to verify that deployed patches actually reached the target systems.

Exam Focus

For SY0-701, choose answers that combine risk reduction with controlled implementation: test, approve, schedule, deploy, verify, document, and prepare rollback. For urgent exploited issues, emergency change may be correct, but it still needs evidence and review.

Test Your Knowledge

A critical internet-facing system needs an urgent security patch, but the change must happen outside the normal monthly window. Which change type best fits?

A
B
C
D
Test Your Knowledge

What is configuration drift?

A
B
C
D
Test Your KnowledgeMulti-Select

Which items belong in a sound patch deployment process? Select three.

Select all that apply

Testing where feasible
Rollback planning
Verification after deployment
Ignoring failed endpoints
Deleting change records after success