A coworker identified a vulnerability in a third-party software solution hosted on-premises. The coworker is out sick and has asked you to remediate this issue as quickly as possible. You have found an official patch from the vendor's website. What is the NEXT procedural step you should take?
Submit a change request according to the company's change management process.
Install the patch immediately and inform affected users.
Changes to production systems, even urgent security patches, must be documented and approved according to the organization's change management policy. This process, often initiated with a Change Request (CR) or Request for Change (RFC), ensures that changes are tested, scheduled, and have a backout plan, minimizing the risk of causing an operational outage. It is the proper first step before deploying any update.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is change management in IT?
Open an interactive chat with Bash
Why is it important to follow change management processes before patching a vulnerability?
Open an interactive chat with Bash
What is a Change Request or CR in change management?