Patch Management
Swisscom carries out automatic patching of the operating system according to the Customer-defined patching windows.
New minor releases and security fixes are automatically installed on the systems during patching. No applications, features or add-ons are installed on Windows systems.
Automated installation of regular hotfixes is carried out after the patches have been assessed internally by Swisscom. Swisscom restarts the systems following installation.
Since there are significant patching-related differences between Windows and Linux, these are explained separately below. With the day-2 action "Update Patching Suspension" one can suspend the automated patching for up to 60 days (Windows) or 120 days (RHEL), measured from the last time the system was patched. If the last patch installation was longer than 60/120 days ago, it is not possible to suspend the automated patching process without patching the system first. One can use the day-2 action "Run On Demand Patching" to immediately patch a system. This action can be executed in all states of the machine. Please note that to prevent accidental patching, it is not allowed to run on-demand patching while the machine's automated patching is suspended. One needs to disable the patching suspension (using the "Update Patching Suspension" action) first.
Release Process
Week | Action |
---|---|
Week 0 | Week 0 means the last week of the current patching month/patch cycle. In this week Swisscom evaluates the latest patches and release them. These patches are installed on a few dedicated test systems to perform functional tests of the patch installation of these patches |
Week 1 | This is the first patching window the user can select on his VM. Typically, development and test systems are patched in this first window |
Week 2 | This is the second patching window the user can select on his VM. It is up to the user which systems shall be patched within this window |
Week 3 | This is the third patching window the user can select on his VM. It is up to the user which systems shall be patched within this window |
Week 4 | This is the fourth patching window the user can select on his VM. It is up to the user which systems shall be patched within this window |
With this mechanism the user is free to choose which systems should be patched in which week.
Actions
Action | Description |
---|---|
Manage Patching Extension/Patching Window | The desired patching window can be changed with this action. |
Manage Patching Extension/On Demand Patching | Can be used to patch a machine immediately. Not possible if the machine has a patching suspension set. |
Manage Patching Extension/Suspension | Can be used to suspend the automated patching process for up to 60 days (measured from the last time the system was patched). If a system is currently in patching suspension, the action can be used to disable the suspension |
Functions/Configuration options
Properties | Description |
---|---|
Patching Window | The customer defines a time window during which the system shall be updated, e.g "2nd Week Wednesday 02:00 - 04:00": The system will be patched every month on the second Wednesday of the month between 02:00 - 04:00 (UTC). It is possible to choose between 36 different patching windows. This maintenance window will be kept as short as possible. |
Emergency Patches | The process for importing emergency patches is performed manually. Emergency patches are installed on the systems outside the maintenance window. The customer is notified of this and a patching date is proposed. The customer can reject this date and make a new proposal. Patching must be done within 10 days, however. Otherwise, the SLAs will be suspended. If the next maintenance window falls within this timeframe, the emergency patch can also be installed during the maintenance window. |
Server state during patching | During the patching window system restarts will be performed if necessary. If multiple systems have the same patching window configured, no guarantee can be given at present as to the sequence in which they will be restarted. |
Restrictions | Hotfixes may not be installed manually via Internet. The deinstallation of already installed hotfixes is not automated. |
Additional information for Managed Windows
Only OS patches are installed during patching for Windows. New OS features are not automatically installed. As for OS patches, a distinction is made between functional patches and security patches. Security patches are installed monthly according to the chosen patching window, functional patches on demand. A Swisscom provided System Center Windows Update Service is used for Windows OS patching. The system to be patched automatically downloads the patches during the patching run, installs them and restarts the server if necessary.
Emergency Patching
The following section describes the handling of so-called "Emergency Patches" in the context of automatic patching of Swisscom Windows service. The process for emergency patching is semi-automated in consultation with the customer.
Definition of emergency patches
The software vendor defines a severity level for each patch. Emergency patches are those which are judged by the manufacturer to have the highest severity level.
Managed Windows
(https://technet.microsoft.com/en-us/security/gg309177.aspx) Swisscom assesses the patches provided by the manufacturer on a monthly basis and releases them. These patches are then automatically installed within the HPMW. If it is necessary to install a patch immediately due to the current situation, this is implemented as promptly as possible in consultation with the customer via the proper change management.
Service Management Process
As soon as the manufacturer (Microsoft) publishes an emergency patch, Swisscom will be informed on the corresponding channels. Swisscom in return informs the customer (about the existing service management processes) that an emergency patch is available and must be installed. The decision when to install an emergency patch is also made via the SM process in consultation with the customer. The period of time that the customer can delay for the installation of an emergency patch is contractually regulated.
The installation of the emergency patches is done via WSUS.