PR.PS-02:
Software is maintained, replaced, and removed commensurate with risk
Implementation Examples
Ex1:
Perform routine and emergency patching within the timeframes specified in the vulnerability management plan
Ex2:
Update container images, and deploy new container instances to replace rather than update existing instances
Ex3:
Replace end-of-life software and service versions with supported, maintained versions
Ex4:
Uninstall and remove unauthorized software and services that pose undue risks
Ex5:
Uninstall and remove any unnecessary software components (e.g., operating system utilities) that attackers might misuse
Ex6:
Define and implement plans for software and service end-of-life maintenance support and obsolescence