Patch Management

Swisscom carries out automatic patching of the operating system according to the Customer-defined patching windows.

New minor releases and security fixes are automatically installed on the systems during patching. No applications, features or add-ons are installed on Windows systems.

Automated installation of regular hotfixes is carried out after the patches have been assessed internally by Swisscom. Swisscom restarts the systems following installation.

Since there are significant patching-related differences between Windows and Linux, these are explained separately below. With the day-2 action "Update Patching Suspension" one can suspend the automated patching for up to 60 days (Windows) or 120 days (RHEL), measured from the last time the system was patched. If the last patch installation was longer than 60/120 days ago, it is not possible to suspend the automated patching process without patching the system first. One can use the day-2 action "Run On Demand Patching" to immediately patch a system. This action can be executed in all states of the machine. Please note that to prevent accidental patching, it is not allowed to run on-demand patching while the machine's automated patching is suspended. One needs to disable the patching suspension (using the "Update Patching Suspension" action) first.

Release Process

WeekAction
Week 0Week 0 means the last week of the current patching month/patch cycle.

In this week Swisscom evaluates the latest patches and release them. These patches are installed on a few dedicated test systems to perform functional tests of the patch installation of these patches
Week 1This is the first patching window the user can select on his VM. Typically, development and test systems are patched in this first window
Week 2This is the second patching window the user can select on his VM. It is up to the user which systems shall be patched within this window
Week 3This is the third patching window the user can select on his VM. It is up to the user which systems shall be patched within this window
Week 4This is the fourth patching window the user can select on his VM. It is up to the user which systems shall be patched within this window

With this mechanism the user is free to choose which systems should be patched in which week.

Actions

ActionDescription
Manage Patching Extension/Patching WindowThe desired patching window can be changed with this action.
Manage Patching Extension/On Demand PatchingCan be used to patch a machine immediately. Not possible if the machine has a patching suspension set.
Manage Patching Extension/SuspensionCan be used to suspend the automated patching process for up to 60 days (measured from the last time the system was patched). If a system is currently in patching suspension, the action can be used to disable the suspension

Functions/Configuration options

PropertiesDescription
Patching WindowThe customer defines a time window during which the system shall be updated, e.g "2nd Week Wednesday 02:00 - 04:00": The system will be patched every month on the second Wednesday of the month between 02:00 - 04:00 (UTC). It is possible to choose between 36 different patching windows. This maintenance window will be kept as short as possible.
Emergency PatchesThe process for importing emergency patches is performed manually. Emergency patches are installed on the systems outside the maintenance window. The customer is notified of this and a patching date is proposed. The customer can reject this date and make a new proposal. Patching must be done within 10 days, however. Otherwise, the SLAs will be suspended. If the next maintenance window falls within this timeframe, the emergency patch can also be installed during the maintenance window.
Server state during patchingDuring the patching window system restarts will be performed if necessary. If multiple systems have the same patching window configured, no guarantee can be given at present as to the sequence in which they will be restarted.
RestrictionsHotfixes may not be installed manually via Internet. The deinstallation of already installed hotfixes is not automated.

Additional information for Managed Windows

Only OS patches are installed during patching for Windows. New OS features are not automatically installed. As for OS patches, a distinction is made between functional patches and security patches. Security patches are installed monthly according to the chosen patching window, functional patches on demand. A Swisscom provided System Center Windows Update Service is used for Windows OS patching. The system to be patched automatically downloads the patches during the patching run, installs them and restarts the server if necessary.

Emergency Patching

The following section describes the handling of so-called "Emergency Patches" in the context of automatic patching of Swisscom Windows service. The process for emergency patching is semi-automated in consultation with the customer.

Definition of emergency patches
The software vendor defines a severity level for each patch. Emergency patches are those which are judged by the manufacturer to have the highest severity level.

Managed Windows
(https://technet.microsoft.com/en-us/security/gg309177.aspx)open in new window Swisscom assesses the patches provided by the manufacturer on a monthly basis and releases them. These patches are then automatically installed within the HPMW. If it is necessary to install a patch immediately due to the current situation, this is implemented as promptly as possible in consultation with the customer via the proper change management.

Service Management Process
As soon as the manufacturer (Microsoft) publishes an emergency patch, Swisscom will be informed on the corresponding channels. Swisscom in return informs the customer (about the existing service management processes) that an emergency patch is available and must be installed. The decision when to install an emergency patch is also made via the SM process in consultation with the customer. The period of time that the customer can delay for the installation of an emergency patch is contractually regulated.

The installation of the emergency patches is done via WSUS.

Last Updated: