IT Examiner School - Oct 2025

CONTROLLED//FDIC INTERNAL ONLY

Procedure 2 – Support and Delivery (S&D) Core Module Procedure 17; Management Core Module Procedures 7, 8, 10, and 11; Development and Acquisition (D&A) Core Module Procedure 7 (End-of-life (EOL) Only) Assessment of information security and cybersecurity risk management programs. The program(s) should be designed to:  Ensure the security and confidentiality of customer information.  Protect against any anticipated threats or hazards to the security or integrity of such information.  Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer. Reference InTREx Core Modules – S&D Procedure 17; Management Procedures 7, 8, 10, and 11; D&A Procedure 1 EOL Only as prescribed below: S&D Core Module Procedure 17 – Patch Management Determine whether sufficient patch management policies and procedures are in place to protect computer systems against software vulnerabilities. Consider the following:  Assignment of responsibilities for patch management  Documentation of reasons for any missing or excluded patches o Intrusion detection/prevention systems (IDS/IPS) o Applications o Workstation products (e.g., Adobe, Microsoft Office, Java) o Other critical systems  Validation that system security configurations remain within standards after patch installation  Documented reviews of vendor-provided patch reports, if patch management is outsourced  Adequacy of automated tools (if being used) to implement patches, to audit for missing patches, and to validate secure configurations after patching  Adequacy of the vulnerability management program in validating the effectiveness of patch management FDIC: When weaknesses are found, consider controls identified in the following Ransomware TEA: Operating System Hardening. Click here to enter comments  Tests of patches prior to implementation  Installation of vendor supplied patches for: o Operating systems o Firewalls o Routers o Switches

Management Core Module Procedure 7 – Information Security Policy

InTREx Abbreviated Core Examination Procedures Module July 29, 2025

Page 4 of 17

Made with FlippingBook Learn more on our blog