What Website Support & Maintenance Should Include: SLAs, Patching, Monitoring

Start with the basics: SLAs that mean something

An SLA (Service Level Agreement) details the specific services to be provided by an agent or agency – in this case, for web support. Knowing what is and isn’t included in your SLA is crucial to your website or apps’ ongoing health.

But to keep things relatively simple, as we know people have different levels of knowledge when it comes to web development work, the aim is simple. When something goes wrong, you know exactly how to raise it. Be this through a ticket or an email, or whatever system your service provider chooses to use. You should also know who owns the job of fixing the problem, and how long it should take for it to be fixed. A good SLA should define the problem priority levels in plain English so everyone is aware of how severe the problem is – e.g. “site down” (huge problem), “checkout broken” (big problem), “cosmetic issue” (not critical). It should also have set response and resolution targets for each, and clearly outline the procedures during business hours versus out-of-hours. 

Critically, a good SLA should be more than just about the emergencies. They should outline a maintenance calendar and what is included in that scheduled work – e.g. core updates, library upgrades, and content freezes. It should also have a change window for high-risk work, and a named owner from the service provider, so you know who to talk to about all of this. Whilst a good provider, like Bluebrick, will provide a monthly report with tickets, root causes, and prevention steps, make sure to stay on top of your SLA provider for transparency. The tone should be calm and practical. No mystery, no hand-waving – just clear promises the team can keep.

Keep sites healthy: patching, updates, and dependencies

Most incidents start as small, routine chores that were skipped. Patching is how you avoid that. A sensible plan covers CMS and framework updates, plugin and module versions, server packages, and any front-end dependencies. You should have a level of priority for this type of work – security patches, then performance and bug fixes. Low-risk updates should be completed in batches to reduce noise and risk. High-risk updates and upgrades should be isolated and given their own releases to make them roll-backable if needed.

Safety comes from the process. Run updates in a staging environment first, with a short smoke test covering templates, forms, login, search, and checkout if relevant. Automate what you can: dependence alerts, version pinning, and basic tests that catch obvious regressions. Keep a neat changelog so you can trace behaviour back to a release. If a plugin stops being maintained, plan a replacement rather than waiting for it to break at the worst possible moment.

Finally, keep an eye on the stack around the site. That includes CDN rules, TLS certificates, domain renewals, and DNS records. None of these are exciting until they fail. Put reminders in the diary and assign an owner.

Stay ahead: monitoring, alerts and response

Monitoring should tell you two things fast: is the site up, and is it behaving. Uptime checks are the baseline. Layer in simple journey monitors for critical paths – can a user sign in, add to basket, and pay? Pair this with lightweight performance tracking so you see if pages slow down after a release. For real-world insight, add field data (how fast the site feels for actual users) alongside the synthetic tests.

Alerting works best when it is quiet most of the time. Set thresholds that reflect reality and group related issues so you don’t spam your team. When an alert fires, the path should be clear: who gets notified, how to acknowledge, and what the runbook says to try first. During an incident, keep updates short and regular, and record decisions. Afterwards, run a quick post-incident review. What happened, why, how we fixed it, and how we’ll stop it from recurring. Share that write-up. It earns trust and makes the next fix faster.

Make it robust: backups, security, and change control

Backups are your last line of defence. They should be automatic, frequent, and tested. Keep copies in more than one location and know how long restores take in practice. Test a restore to staging at least quarterly; nothing is “backed up” until you have proven you can bring it back.

Security is a continuous mindset, not something you can set and forget. Keep least-privilege access to the CMS and hosting, rotate credentials, and use 2FA for admin accounts. Patch promptly, scan for known vulnerabilities, and consider a WAF (Web Application Firewall) for common attack patterns. Log the important things – admin logins, role changes, deployment events – and review anomalies alongside your monitoring.

Change control keeps you safe while moving forward. Use pull requests and code review. Release in small increments with clear rollbacks. For content-heavy sites, treat big content changes as you would a code change – review and schedule them, and avoid last-minute edits during peak traffic.


A final thought – good support isn’t a hotline you call when the site is on fire. It’s a rhythm of small, sensible habits – clear SLAs, regular patching, quiet monitoring, tested backups – that keep things boring in the best possible way. When the unexpected does happen, the team knows what to do, who’s doing it, and how you’ll learn from it.

GET IN TOUCH