Skip to main content

How often do you release your updates? What is your patch management policy?

Updated over 2 weeks ago

Vulnerabilities, updates, and patch management are handled in accordance with ISMS guidelines, ISO 27001:2022 Control 8.8 (Management of Technical Vulnerabilities), and SOC 2 Common Criteria CC 7.1 (System Monitoring and Vulnerability Management) and CC 8.1 (Change Management). These frameworks ensure that technical risks are identified and mitigated through a structured patching process. A formal policy document is available upon request.

The updates contain security enhancements, bug fixes, and new features. With each release, customers receive a notification, detailed release notes, and updated documentation.

Teramind Cloud

For Cloud deployments, the Agent and server components (such as the web Dashboard) are updated several times a month.

  • Server Maintenance: Server components are maintained entirely by Teramind with no downtime during the update process.

  • Agent Updates: If the "Auto-update" feature is enabled, the Agent is updated automatically in the background, which typically takes only a few minutes.

On-Premises and Private Cloud

For On-Premises and Private Cloud deployments (AWS, Azure, GCP, etc.), Teramind releases updated Virtual Machine (VM) images several times a year. The VM image contains both the Agent and server components.

  • Update Process: Customers can download the latest VM image from the Self-Hosted Portal and update their instance via the Dashboard. Depending on the complexity of the deployment, this can take from a few minutes to several hours.

  • Agent Deployment: Agent updates can be performed locally or managed remotely via SCCM, Group Policy (GPO), or other remote deployment tools such as an MDM solution.

OS and Package Management

  • On-Premises: Server OS and package updates can be applied via the VM console or through an SSH session.

  • Private Cloud: OS/package updates for Private Cloud deployments can be managed through the respective hosting provider's portal (e.g., AWS Management Console or Azure Portal).

Emergency Patch Management

Teramind employs an expedited Emergency Patch Management protocol to address critical vulnerabilities and zero-day exploits immediately. For Cloud users, hotfixes are applied automatically by Teramind with zero downtime, while On-Premises and Private Cloud customers are notified of out-of-band updates via email or support channel. To maintain compliance with ISO 27001:2022 (Control 8.8) and SOC 2 Type II (Common Criteria 7.1), critical security patches are prioritized for deployment as soon as a validated fix becoming available, ensuring that technical vulnerabilities are mitigated within the shortest possible time.

Did this answer your question?