• Home
  • /
  • Vulnerability and Patch Management Policy

Vulnerability and Patch Management Policy

Last Updated: August 18, 2025

1. Purpose

The purpose of this policy is to establish a structured and proactive approach to identify, assess, remediate, and verify vulnerabilities in TheAgencyFounder’s information systems, applications, and firmware. This ensures that potential security risks are addressed promptly, minimizing the likelihood of exploitation and ensuring compliance with Meta’s Third Party Assessment (TPA) requirements.

2. Scope

This policy applies to:

  • All information systems, applications, and firmware owned, managed, or operated by TheAgencyFounder.
  • All employees, contractors, and third parties with access to our systems.
  • All environments including production, staging, development, and backup systems.

3. Policy Statement

TheAgencyFounder will maintain a continuous vulnerability and patch management process that:

  1. Periodically scans systems to detect vulnerabilities or missing security patches.
  2. Prioritizes identified vulnerabilities based on risk severity.
  3. Applies security patches promptly in accordance with defined timelines.
  4. Maintains audit logs of all scanning, remediation, and verification activities.

4. Roles and Responsibilities

RoleResponsibility
IT/Security TeamConduct regular vulnerability scans, evaluate risks, apply patches, and document remediation.
System OwnersApprove maintenance schedules and coordinate downtime for patch deployment.
Vendors/Third PartiesApply patches for systems or services under their control in alignment with this policy.
Compliance OfficerMonitor adherence to the policy and maintain related documentation for audits.

 

5. Vulnerability Identification

  • Automated Scanning: Perform vulnerability scans on all systems at least once a month using approved tools.
  • Manual Review: Conduct manual security reviews during major application updates or infrastructure changes.
  • Threat Intelligence Feeds: Monitor trusted sources (e.g., NVD, CVE databases, vendor advisories) for new vulnerabilities.

6. Risk Assessment & Prioritization

Vulnerabilities will be categorized and addressed according to severity:

Severity LevelAction Timeline
Critical (CVSS 9.0–10.0)Patch or mitigate within 24–48 hours
High (CVSS 7.0–8.9)Patch or mitigate within 5 business days
Medium (CVSS 4.0–6.9)Patch or mitigate within 15 business days
Low (CVSS < 4.0)Address in next scheduled maintenance cycle

 

7. Patch Deployment Process

  1. Testing: Apply patches in a test environment to ensure stability.
  2. Approval: Obtain change management approval before production deployment.
  3. Deployment: Apply patches following approved maintenance windows.
  4. Verification: Conduct post-patch validation scans to ensure vulnerabilities are resolved.

8. Exceptions

  • In rare cases, if applying a patch is not feasible due to business or technical constraints, a documented risk acceptance or compensating control must be approved by the Compliance Officer.

9. Documentation & Reporting

  • Maintain records of all scans, vulnerabilities detected, remediation steps, patch dates, and verification results.
  • Provide vulnerability management reports to Meta or relevant auditors upon request.

10. Compliance & Review

  • This policy will be reviewed annually or whenever there are significant changes to systems or threat landscapes.
  • Non-compliance may result in disciplinary action, system access revocation, or contractual penalties for third parties.