||Recovery from Unauthenticated Patching Systems: Service Providers, Network Operators, and Equipment Suppliers should assure that patching distribution hosts properly sign all patches. Critical systems must only use OSs and applications which employ automated patching mechanisms, rejecting unsigned patches. If a patch fails or is considered bad, restore OS and applications from known good backup media.
||Cable; Internet/Data; Wireless; Wireline
||Service Provider; Network Operator
||Cyber Security;Network Operations;Software;
||Configuration guide for security from NIST (800-53 Rev. 3).