๐ ๏ธ Section 17: Patch & Vulnerability Management
๐ฏ Objective
This section outlines the procedures, tooling, and schedules for maintaining patched and secure software , container images, and infrastructure configurations in the OpenCMMC Stack. It supports compliance with CMMC Level 2 practices in the System & Information Integrity (SI) , Configuration Management (CM) , and Risk Assessment (RA) domains.
๐ Continuous Patching Strategy
1. Host-Level Patching
Component
Method
Schedule
Ubuntu OS
apt update && apt upgrade via Ansible
Weekly (auto), Monthly (manual)
Kernel/critical CVEs
unattended-upgrades + CVE tracking
Daily
System hardening validation
Ansible diff or compliance check
Monthly
2. Container Image Refresh
Component
Source
Validation
Podman images
podman pull <image>
Digest verification
Image integrity
skopeo inspect + SBOM check
grype, trivy
Drift detection
ansible-playbook dry-run
Weekly
Tool
Target
Purpose
grype
Local containers, images
SBOM and CVE scans
trivy
Container registry, file systems
Vulnerability + secret scan
clamav
File uploads in Nextcloud
Malware detection
ansible-lint
IaC playbook scan
Misconfig checks
๐ Patch Lifecycle Automation (Ansible)
Role: roles/patching
Features:
OS package updates
Container image digests refresh
Service restarts for updated dependencies
Backup validation prior to changes
Summary report email
๐งช Verification Checklist
Check
Method
Evidence
CVE reports resolved
grype, trivy
JSON scan reports
Kernel patches current
uname -r, apt
CLI output
Image digests match SBOM
skopeo inspect
Diff report
No critical unpatched packages
apt list --upgradable
CLI export
Patch playbook log exists
ansible-playbook log
Log file
๐
Recommended Patch Schedule
Frequency
Tasks
Daily
Security CVE polling, unattended upgrades
Weekly
OS & container image patch via Ansible
Monthly
Restore test, SBOM scan, role diff
Quarterly
Full stack rebuild in staging
๐ CMMC Practices Addressed
Practice
Description
SI.1.210
Identify and manage system flaws
SI.2.214
Update and patch system vulnerabilities
CM.2.067
Monitor system configuration for change
RA.2.144
Scan for vulnerabilities
โ
Next Step
In Section 18, weโll define the incident response and forensics capabilities to prepare for breach scenarios and ensure auditability.