Lesson 9.3 — Applying updates within 14 days: patch workflow, failed updates, emergency fixes and evidence
This lesson explains how to operate the Cyber Essentials 14-day update requirement in practice.
What You'll Be Able to Do
By the end of this lesson, you will be able to:
- run a practical update workflow
- decide when the 14-day rule applies
- calculate the deadline from vendor release date
- triage high and critical updates
- deploy updates within the required timeframe
- manage failed updates
Why This Matters
It turns the software inventory and ownership matrix into a working patch workflow covering update monitoring, severity triage, testing, deployment, failed updates, emergency fixes, supplier updates, rollback, exceptions and evidence.
The Core Rule
The 14-day rule is not just a policy statement.
It needs a working process.
What the CE Assessor Looks For
A strong position shows:
- update sources are monitored;
- high/critical updates are identified quickly;
- vendor release date is recorded;
- 14-day deadline is calculated correctly;
- ownership is assigned;
- testing is proportionate;
Copy This
Keep this rule visible:
For every high-risk security fix, know the release date, deadline, owner, deployment status, completion evidence and any unresolved exceptions.
Quick Checklist
Before moving on, make sure you can say yes to these:
- [ ] When does the 14-day clock start?
- [ ] What are the three main triggers for the 14-day rule?
- [ ] Why is a monthly patch review sometimes not enough?
- [ ] What are the seven stages of the practical workflow?
- [ ] Why is verification important?
Your Action
Do this now — it takes 10–20 minutes.
Document your patch process: how do updates get applied, who is responsible, and how is it verified? Record the process in Section SU.
Key Takeaway
For every high-risk security fix, know the release date, deadline, owner, deployment status, completion evidence and any unresolved exceptions.
Your Workbook Activity
Complete: 14-day security update workflow and evidence record
Next Lesson
In the next lesson: Unsupported software: end-of-life systems, isolation, removal plans and evidence