Patch Management Procedure


Document Number: ISMS-PROC-BYOD-02

Version: 0.1.0

Parent Policy: BYOD Security Policy (ISMS-POL-BYOD-01)

Author: Lucas Shin — Security Director

Last Modified: February 18, 2026


1. Purpose

This procedure defines how OS and application vulnerabilities are identified, monitored, and remediated on BYOD devices. It combines automated enforcement (Intune + Conditional Access) with a compensating manual control (Updatest) to achieve continuous patch compliance.


2. Automated Patch Management Process

StepProcess DetailsTechnical Control
1. InventoryDeploy business apps via VPP and define them as 'Managed Apps'Apple VPP + Intune
2. VisibilityCollect real-time information on device OS versions and managed app vulnerabilitiesIntune Compliance Engine
3. Setting StandardsSet the latest security patch (N-1) as the minimum compliance standardCompliance Policy
4. Automatic EnforcementBlock access to all internal assets via Conditional Access when standards are not metEntra ID Conditional Access
5. Patch ExecutionBlocked users patch directly via system updates or UpdatestUpdatest / OS Software Update
6. Evidence CaptureAutomatically records the transition history to 'Compliant' after patch completionIntune Compliance Report

3. Platform-Specific Patch Management

3.1 macOS (MacBook, Mac Mini)

3.2 iOS / iPadOS

3.3 Android


4. Compensating Control: Updatest

Updatest is a compensating control for applications outside Intune/VPP management scope (personal apps that could introduce vulnerabilities).

4.1 Limitations

4.2 User Responsibility

  1. Run the Updatest app every Friday before end of work
  2. Perform Update All
  3. Take a screenshot showing all apps are up to date
  4. Upload the screenshot to the designated security channel (Teams)

5. Operational Routine

5.1 User Routine (Every Friday)

  1. Run UpdatestUpdate All
  2. Screenshot showing current status
  3. Upload to designated Teams security channel

5.2 Administrator Routine

FrequencyActionOwner
DailyMonitor Intune dashboard for 'Non-compliant' devicesLucas
WeeklyVerify all employees have submitted Updatest screenshots; follow up with those who haven'tLucas
QuarterlyExport and archive Intune compliance reports to SharePointLucas

6. Escalation Procedure (Non-compliance)

TimelineActionMechanism
Day 0Automated email warning sent to userIntune Compliance Policy (Actions for noncompliance)
Day 0Access to M365 and SaaS automatically blockedEntra ID Conditional Access
Day 7 (unresolved)Security Director escalates to CISOManual report via email or Teams

7. Evidence Retention

Evidence TypeRetention PeriodStorage Location
Intune Compliance ReportsMinimum 12 months (exported quarterly)SharePoint
Updatest ScreenshotsMinimum 12 monthsTeams security channel
Conditional Access LogsDefault 30 days in Entra ID; exported quarterly for long-termSharePoint

8. Periodic Review


[End of Procedure]