Change Management

What is Change Management?

Change Management is the formalised governance process ensuring all technical and organisational modifications are documented, assessed, and authorised. The Primary Implementation Requirement involves executing mandatory security impact assessments under Annex A 8.32, delivering the Business Benefit of a stable control environment that prevents unauthorised vulnerabilities and accidental security breaches.

What is Change Management?

Change management is the controlled process of planning, reviewing, and implementing changes to an organisation’s systems, services, or processes. In the context of ISO 27001, it ensures that any changes, whether planned or unplanned, do not negatively impact the confidentiality, integrity, or availability of information. It is a key preventative measure to avoid new vulnerabilities.

Key Components & Examples

  • Controlled Process: A formal process for requesting, approving, and tracking changes. This often involves a Change Advisory Board (CAB) to review the security implications of a proposed change.
  • Risk Assessment: Before a change is implemented, its potential impact on information security is assessed. For example, a software update must be evaluated for new vulnerabilities it might introduce.
  • Communication: All relevant stakeholders are informed about the change, its timeline, and potential impact.
  • Documentation: All changes, including their approval and implementation, are formally documented and recorded for audit purposes.

ISO 27001 Context

Change management is a critical part of the control environment in ISO 27001, addressed in ISO 27001 Annex A 8.32 Change Management. It is essential for maintaining the integrity and security of the Information Security Management System (ISMS) over time, ensuring that the organisation remains compliant and protected as its systems evolve.

                                                                                                                                                                                           
Related ISO 27001 ControlRelationship Description
ISO 27001 Annex A 8.32: Change ManagementCore Requirement: The primary technical and operational control that mandates a formal process for ensuring changes to systems and services do not introduce new security risks.
ISO 27001 Annex A 8.19: Software InstallationTechnical Implementation: Specifically governs the deployment phase of change management, ensuring that software updates are authorized and do not compromise system integrity.
ISO 27001 Annex A 8.25: Secure Development Life CycleProcess Lifecycle: Change management is a critical component of the SDLC, ensuring that code changes and system updates follow a secure, tested, and approved path.
ISO 27001 Clause 6.3: Planning of ChangesGovernance: A high-level requirement focusing on how the ISMS itself is updated, ensuring changes to the security framework are carried out in a planned and strategic manner.
Glossary: CIA TriadSecurity Objective: The fundamental goal of the change management process is to protect the Confidentiality, Integrity, and Availability of assets during the transition state.
Glossary: IntegrityCore Principle: Change management is specifically vital for “Integrity,” as uncontrolled changes are the most common cause of data corruption or unauthorized system modification.
Glossary: AuditVerification: Documentation produced during the change management process (approvals, logs, impact assessments) is a primary evidence source for ISO 27001 auditors.
ISO 27001 Glossary of Terms (Main Index)Parent Directory: The central index where Change Management is categorized as a vital preventative control within the ISO 27001 framework.

How to implement Change Management

Implementing formal Change Management is a critical security control under ISO 27001 Annex A 8.32, designed to ensure that modifications to your systems do not introduce unforeseen vulnerabilities. As a Lead Auditor, I look for a process that is auditable, consistent, and technically rigorous. Following this 10-step roadmap will result in a robust change control environment that protects the confidentiality, integrity, and availability of your information assets while satisfying mandatory compliance requirements.

1. Provision the Change Management Policy

  • Provision a formal Change Management Policy: Document the scope, roles, and responsibilities for all technical and organisational changes, resulting in a clear governance framework that aligns with ISO 27001 requirements.

2. Formalise the Change Advisory Board (CAB)

  • Formalise the membership of the Change Advisory Board: Appoint stakeholders from security, IT, and business operations, resulting in a multi-disciplinary review process that identifies cross-functional security risks.

3. Provision the Asset Register and Baseline

  • Provision a comprehensive Asset Register: Identify all scoped hardware, software, and data assets, resulting in a technical baseline against which all proposed modifications can be accurately measured.

4. Document the Rules of Engagement (ROE)

  • Document the Rules of Engagement for emergency changes: Establish accelerated protocols for critical security patches or system failures, resulting in rapid remediation without bypassing essential security oversight.

5. Formalise the Request for Change (RFC) Process

  • Formalise a standardised RFC template: Mandate the documentation of change descriptions, technical justifications, and implementation dates, resulting in an auditable trail for every modification made to the ISMS.

6. Execute Technical Security Impact Assessments

  • Execute a mandatory security impact assessment for every RFC: Evaluate how changes affect existing IAM roles, firewall rules, and data flows, resulting in the proactive identification of potential security gaps.

7. Provision a Controlled Testing Environment

  • Provision isolated staging or UAT environments: Test 100 per cent of significant changes outside of the production boundary, resulting in the verification of technical stability and security control effectiveness.

8. Enforce Multi-Factor Authentication (MFA) for Implementers

  • Enforce MFA for all privileged access during change execution: Protect the implementation phase by requiring strong authentication for administrators, resulting in a reduced risk of unauthorised account takeover during system maintenance.

9. Formalise Back-out and Recovery Plans

  • Formalise a mandatory back-out plan for every approved change: Document exact technical steps to revert to the previous known-good state, resulting in protected system availability should the implementation fail.

10. Audit Change Logs and Close RFCs

  • Audit system logs against approved RFCs: Reconcile implemented changes with formal authorisations, resulting in the detection of “Shadow IT” or unauthorised modifications and ensuring continuous ISO 27001 compliance.

Change Management FAQ

What is change management in the context of ISO 27001?

Change management is a formal process ensuring that 100% of modifications to information systems, business processes, or security facilities are documented, assessed, and authorised before implementation. Under ISO 27001 Annex A 8.32, it serves as a critical control to prevent unauthorised changes that could compromise the confidentiality, integrity, or availability of information assets.

   

What are the essential steps in a compliant change management process?

   

A high-performance change management process involves five modular stages to satisfy technical auditors:        

               
  • Request: Formal documentation of the proposed change and its business justification.
  •            
  • Impact Assessment: Technical evaluation of security risks and potential operational disruptions.
  •            
  • Approval: Formal authorisation by a designated Change Advisory Board (CAB).
  •            
  • Implementation: Execution of the change in a controlled environment, often involving MFA.
  •            
  • Review: Post-implementation audit to verify the change achieved its goal without introducing new vulnerabilities.
  •        
   

   

How does change management differ from configuration management?

   

Change management focuses on the process of making alterations, while configuration management maintains the “source of truth” for system states. Data indicates that organisations integrating both functions reduce unauthorised system drifts by up to 45%. Change management asks “Should we change this?”, while configuration management asks “What does the system look like right now?”.

   

What are the risks of poor change control in an ISMS?

   

Poor change control is responsible for approximately 60% of avoidable system outages and 35% of accidental security breaches. Without a formal process, unauthorised configurations can bypass firewalls, revoke IAM permissions, or disable logging, leading to major non-conformities during ISO 27001 Stage 2 certification audits.

   

How often should an organisation audit its change management logs?

   

Change management logs should be reviewed at least quarterly, though high-risk environments should perform monthly reconciliations between change requests and system logs. Ensuring that 100% of implemented changes have a corresponding approved request is a fundamental requirement for maintaining continuous compliance and passing annual surveillance audits.

Stuart and Fay High Table

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top