OBJECTIVE 1.3 Explain

Explain the importance of change management processes and the impact to security

Change management exists because uncontrolled changes are the number one source of outages and security incidents. Every misconfiguration, every “quick fix” deployed without review, every unauthorized patch — these are changes that bypassed the process.

The Change Management Process

1. Request for Change (RFC)

Formal proposal documenting what’s changing, why, and how.

  • Includes: description, justification, scope, affected systems, rollback plan
  • Not just for code — infrastructure changes, firewall rule modifications, policy updates

2. Impact Analysis

Before approving anything, assess what could break.

  • Dependencies: What systems/services rely on the component being changed?
  • Security impact: Does this open new attack surface? Weaken existing controls?
  • User impact: Downtime windows, workflow disruptions
  • Rollback complexity: How hard is it to undo if something goes wrong?

3. Approval

Changes go through a Change Advisory Board (CAB) or designated authority.

  • CAB typically includes representatives from IT, security, business units, and operations
  • Risk-weighted: routine changes may have pre-approved fast-track; high-risk changes get full review
  • Emergency changes have an expedited process but still require documentation after the fact

4. Testing

Validate in a non-production environment before deployment.

  • Staging/pre-production environment that mirrors production
  • Test the change AND test the rollback procedure
  • Security testing: verify the change doesn’t introduce vulnerabilities

5. Implementation

Execute the change according to the approved plan.

  • Follow the maintenance window / deployment schedule
  • Document any deviations from the plan in real-time
  • Have the rollback plan ready to execute immediately

6. Documentation and Closure

Record what was done, when, by whom, and the outcome.

  • Update configuration management database (CMDB)
  • Close the change ticket
  • Lessons learned if anything deviated from plan

Key Concepts

Ownership

Every change has an owner accountable for its success and security implications. “Somebody changed it” is not acceptable — every change maps to a person and an approval.

Stakeholders

People affected by the change who must be consulted or informed:

  • System owners, security team, end users, management
  • Exam focus: The question will describe a change and ask who should be involved

Version Control

Track all changes to code, configuration, and documentation.

  • Enables rollback to known-good states
  • Provides audit trail of what changed, when, and by whom
  • Security relevance: Unauthorized changes to version-controlled assets are immediately visible

Backout/Rollback Plan

Every change must have a documented path back to the previous state.

  • Tested before the change is implemented
  • Includes success criteria: “If X doesn’t work within Y minutes, we roll back”
  • Exam trap: A change without a rollback plan should not be approved

Maintenance Windows

Scheduled time periods for implementing changes with minimal business impact.

  • Defined in SLAs
  • Emergency changes may happen outside windows but require stronger justification

Configuration Management

Maintaining a documented baseline of system configurations.

  • Baseline: Known-good configuration that all systems should match
  • Drift detection: Automated comparison of actual vs. baseline configuration
  • Unauthorized drift = potential compromise indicator

Change Types

Standard Change — Pre-approved, low-risk, follows a documented procedure. Examples: password resets, adding a user to an existing group.

Normal Change — Goes through full RFC → approval → implementation lifecycle. Most changes fall here.

Emergency Change — Bypasses normal approval for critical issues (active security incident, production-down). Still documented — just after the fact.

Technical Implications

Allow/Deny Lists

Changes to application allow/deny lists affect what software can execute. Must go through change management because:

  • Adding to an allow list expands the attack surface
  • Removing from a deny list may re-enable previously blocked threats

Downtime and Service Restarts

Changes often require service restarts or brief outages.

  • Plan for impact on dependent systems
  • Communicate maintenance windows to affected users
  • Stagger deployments to maintain availability (rolling updates)

Offensive Context

Attackers love environments with weak change management. If changes aren’t tracked, an attacker can modify firewall rules, install backdoors, or alter configurations — and nobody notices because untracked changes are normal. Strong change management means every unexpected change is an anomaly worth investigating. It’s a detective control disguised as a process.