Skip to main content

💼 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches.

  • Contextual name: 💼 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches.

  • ID: /frameworks/pci-dss-v3.2.1/06/02

  • Located in: 💼 6 Develop and maintain secure systems and applications

Description

Install critical security patches within one month of release.

Critical security patches should be identified according to the risk ranking process defined in Requirement 6.1.

Similar

  • Sections
    • /frameworks/pci-dss-v4.0/06/03/03
    • /frameworks/aws-fsbp-v1.0.0/ssm/02
  • Internal
    • ID: dec-c-dd6c916a

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [SSM.2] Amazon EC2 instances managed by Systems Manager should have a patch compliance status of COMPLIANT after a patch installation
💼 PCI DSS v4.0 → 💼 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates2

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 PCI DSS v4.0 → 💼 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates2

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (2)

PolicyLogic CountFlags
📝 AWS DMS Replication Instance Auto Minor Version Upgrade is not enabled 🟢1🟢 x6
📝 AWS RDS Instance Auto Minor Version Upgrade is not enabled 🟠🟢1🟠 x1, 🟢 x6