Skip to content

BIM.PR.25 — Patch Management

BİM.PR.25 — Patch Management Procedure

Document No BİM.PR.25 Version 1.0 First Published 26.04.2026
Owner Group Systems & Server Management + Network & Security Group
Approver Mehmet ARARAT — IT Director
Legal Basis KVKK Art.12 · ISO/IEC 27001:2022 A.8.8 · BİGDES
Related Documents KYS.POL.01 P15 (Change), P16 (Vulnerabilities), KYS.POL.02, BİM.PR.04 (Maintenance), BİM.PR.09, BİM.PR.10

1. Purpose and Scope

Within the framework of KYS.POL.01 P15 (Change Management) and P16 (Vulnerability Detection), defines the classification and implementation framework for timely remediation of identified security vulnerabilities in systems.

Covers operating systems, server software, network devices (firewall/switch/router), user computers (laptop/desktop), application platforms, and certificates.

2. Classification

Class CVSS / Severity Target Timeline
Critical / Emergency CVSS ≥ 9.0 or active exploitation Within 7 days
High CVSS 7.0–8.9 30 days
Medium CVSS 4.0–6.9 60 days
Low CVSS < 4.0 Standard maintenance window

3. Process

  1. Sources: USOM/UDB bulletins, vendor security advisories, NIST NVD CVE feed, BIM internal penetration tests (BİM.PR.03)
  2. Impact assessment: affected system list → pending patch list
  3. Testing: DEV/staging environment first
  4. Approval: immediate for critical, others via weekly change board (BİM.PR.09)
  5. Implementation: during standard maintenance windows
  6. Verification: post-patch service test + scan

4. Maintenance Windows

Out-of-hours window: weekdays 22:00–06:00, Saturday 14:00–18:00, Sunday 08:00–14:00. Patches are applied within these windows whenever possible. Planned maintenance is announced in advance on the System Status page.

5. Emergency Patch (Zero-day)

  • Service interruption may occur even without user notification
  • Notification posted on System Status page after the fact
  • Emergency patches are not applied without a rollback plan (snapshot)

6. Exceptions

Systems where patching is not feasible (legacy application dependency): risk assessment is documented (BİM.PR.06), compensating controls applied (network isolation, additional monitoring). Annual review.

7. User Devices

  • OS updates pushed automatically via MDM/WSUS
  • Restart forced within the “out-of-business-hours window”
  • Critical patches applied within 7 days

8. KVKK

Personal data flows are not interrupted during patching; considered a technical measure under KVKK Art.12.

9. Effective Date

26.04.2026; revised January/July.


Hasan Kalyoncu University · IT Directorate
Osmanlı Mah. Havaalanı Yolu Üzeri 8. Km 27010 Şahinbey/Gaziantep
444 6 458 · destek@hku.edu.tr · destek.hku.edu.tr · portal.hku.edu.tr
KEP: hasankalyoncu.unv@hs01.kep.tr

Scroll to Top