The average Australian SMB takes 16 days to deploy a critical patch. The ACSC Essential Eight requires internet-facing systems patched within 14. That two-day gap is where 60% of AU SMB breaches begin. This playbook closes it -- with a documented process, not good intentions.
30-Day Money-Back Guarantee
These are the four most common patch management failures that lead to Australian SMB breaches. If any of these describe your current process, this playbook was built to fix it.
The ACSC Essential Eight ML-1 requires internet-facing systems to be patched within two weeks of a critical or high-severity patch release. A month-or-two patching cycle is not a minor gap -- it is a violation of the baseline standard that cyber insurers and government contractors now check against. The ACSC 2025 Annual Cyber Threat Report recorded 87,400 cybercrime reports in Australia, with unpatched systems accounting for the single largest attack vector category.
Patch management without documentation is indistinguishable from no patch management at all during an insurance claim, a post-incident investigation, or an ACSC audit. Insurers ask for patch records. Regulators ask for evidence of process. Incident responders need to know the state of systems before an attack. The Vendor Patch Tracker and Monthly Runbook in this playbook create the audit trail that protects you when questions are asked after the fact.
Zero-day vulnerabilities do not respect business hours. CVE-2026-5281, the Chrome zero-day actively exploited in 2026, hit on a Thursday. Organisations without a documented emergency patch protocol spent the weekend debating whether to patch production systems without testing -- and many simply waited. The Emergency Patch Protocol in this playbook gives your team a clear decision tree for zero-day response: when to patch immediately, when to isolate first, and who has authority to approve emergency changes at 10pm on a Friday.
The ACSC 2025 Annual Cyber Threat Report found that 60 percent of significant breaches affecting Australian small and medium businesses originated from unpatched vulnerabilities. That is not a statistic about organisations that ignored patching -- many of those businesses patched regularly. The problem was that their process was informal, inconsistent, and did not prioritise correctly. A CVSS 9.8 vulnerability was sitting open on an internet-facing web server while the team worked their way through a backlog of routine updates.
Sources: ACSC Annual Cyber Threat Report 2024-25. Industry patch deployment time: Ponemon Institute / IBM Security 2024 patch benchmarking data.
Every document in this playbook maps to a real gap that causes AU SMB breaches. No filler, no padding -- just the operational tools your team will actually use on the day they need them.
A ready-to-customise policy document that establishes your organisation's formal patch management obligations, aligned to ACSC Essential Eight Maturity Level 1. Editable fields for your business name, systems scope, responsible roles, and approval authority.
A structured framework for classifying patches by severity and assigning mandatory deployment timelines. Based on CVSS v3.1 scoring with ACSC Essential Eight context applied to each tier.
Step-by-step operational guide for running a repeatable monthly patching cycle from inventory through to documentation. Written for the IT lead running the process, not for a CISO writing a strategy document.
A documented decision framework for responding to zero-day vulnerabilities and actively-exploited critical CVEs outside the normal monthly patch cycle. Designed to be actionable at any hour, including outside business hours.
A structured spreadsheet for tracking patch status across all vendors, products, and systems. Creates the audit trail that insurance claims, incident investigations, and ACSC compliance reviews require.
A direct mapping of every document in this playbook to the ACSC Essential Eight v3 patch management control requirements at Maturity Level 1. Use this to demonstrate compliance during internal audits, insurance assessments, or government contract reviews.
A pre-built calendar of all known Microsoft Patch Tuesday dates for 2026, plus major vendor patch cycles for Adobe, Apple, Cisco, Oracle, and VMware. Integrate into your monthly runbook to pre-schedule patch review windows.
Patch management consultants in Australia bill at $150 to $250 per hour. A formal patch management engagement -- policy, process design, tool selection, and documentation -- runs $3,000 to $8,000 for a small business scope. Here is how this playbook stacks up against that cost.
Writing a patch management policy from scratch that satisfies ACSC Essential Eight ML-1 requirements takes a consultant 3--6 hours. This playbook includes a finished, editable policy template ready to customise in under an hour.
Defining CVSS-based SLA tiers and getting management sign-off on patching timelines requires a structured framework. Consultants charge 2--4 hours to design and document this. The Patch Priority Matrix in this playbook delivers that structure immediately.
Documenting a repeatable patching process that IT staff can follow without supervision -- inventory, test, deploy, verify, document -- takes a process consultant 4--8 hours. This runbook is written, structured, and ready to adapt to your environment.
Building a zero-day response protocol with authority matrices and decision trees is time-sensitive specialist work. Most SMBs never have this documented until after an incident. This playbook includes a ready-to-use emergency protocol.
A structured patch tracker that feeds into compliance reporting takes a consultant 1--2 hours to set up from a blank spreadsheet. This template is pre-built with all required fields and ready to populate from day one.
Mapping your patch management documentation to ACSC Essential Eight v3 controls -- with evidence guidance and gap analysis -- typically requires 2--3 hours with a compliance consultant. This bonus document does the mapping for you.
These are not hypothetical future threats. All three of the following CVEs actively exploited Australian businesses in 2026, and all three had patches available before the exploits were observed in the wild.
A type confusion vulnerability in Chrome's V8 JavaScript engine was exploited in the wild before Google released a patch. After the patch was released, average deployment time across Australian businesses was 16+ days -- two days past the ACSC ML-1 deadline. Organisations with a formal emergency patch protocol deployed within 48 hours. Those without a process took three weeks. The attackers knew the difference.
A critical vulnerability in the axios HTTP library affected thousands of Node.js applications across Australian businesses. Development and operations teams running unpatched dependencies were exposed. This is precisely the type of vulnerability the Vendor Patch Tracker is designed to catch -- tracking not just OS and application patches but third-party library dependencies that are routinely overlooked in informal patching processes.
A remote code execution vulnerability in Progress ShareFile was actively exploited against internet-facing file-sharing infrastructure. The ACSC Essential Eight ML-1 requirement to patch internet-facing systems within two weeks exists precisely because of vulnerabilities like this one. Businesses with a documented patch process meeting that timeline were protected. Those without one were not.
The ACSC updated Essential Eight guidance to v3 with strengthened maturity level definitions and clearer assessment criteria. Government contractors and businesses in regulated sectors are now assessed against v3 standards. Cyber insurance providers are increasingly using Essential Eight alignment as a policy condition or premium factor. ML-1 is the baseline -- and patch management is the control most commonly cited as the reason businesses fail to achieve even ML-1. This playbook fixes that specific gap.
If this playbook is not the clearest, most actionable patch management resource you have seen for an Australian SMB -- including better than anything your current consultant has produced -- email us within 30 days for a full refund. No questions, no hassle. The next zero-day is not waiting for your process to be ready. This playbook is.
The difference between 14 days and 16 days is the difference between compliant and breached. Get the playbook, implement the process this week, and know that your patching is documented, defensible, and ready for the next incident.
30-Day Money-Back Guarantee
Secure checkout via Polar. Instant download. One-time payment. 7 documents, immediate access.
If you are building out your full compliance posture, these two products pair directly with this playbook.
When a breach does happen despite your patching, this playbook covers the first 72 hours. Ransomware, data breach, and BEC scenarios with step-by-step decision trees and OAIC NDB notification guide. The operational companion to this patch management kit.
Patch management reduces breach risk. This kit handles what happens after a breach reaches personal data -- the 72-hour OAIC notification requirement, data inventory template, and APP review checklist. Together, these two kits cover the before and after.
If you would prefer an expert to review your current patch management process, assess your Essential Eight maturity level, or build a remediation plan tailored to your environment, a consultation is the right starting point.
Book a Consult at consult.lil.business