CHG-01: Change Management Program
Mechanisms exist to facilitate the implementation of a change management program.
Control Question: Does the organization facilitate the implementation of a change management program?
General (45)
| Framework | Mapping Values |
|---|---|
| AICPA TSC 2017:2022 (used for SOC 2) (source) | CC2.2-POF13 CC3.4 CC3.4-POF4 CC6.8-POF3 CC8.1 CC8.1-POF1 CC8.1-POF10 CC8.1-POF11 CC8.1-POF13 CC8.1-POF14 CC8.1-POF16 CC8.1-POF2 CC8.1-POF3 CC8.1-POF4 CC8.1-POF5 CC8.1-POF6 CC8.1-POF7 CC8.1-POF8 CC8.1-POF9 |
| COSO 2017 | Principle 9 Principle 15 |
| CSA CCM 4 | CCC-01 CEK-06 CEK-06 |
| CSA IoT SCF 2 | CCM-02 CCM-08 |
| ENISA 2.0 | SO14 |
| GovRAMP Low+ | CM-03 |
| GovRAMP Moderate | CM-03 |
| GovRAMP High | CM-03 |
| ISO 27001 2022 (source) | 6.3 |
| ISO 27002 2022 | 8.19 8.32 |
| ISO 27017 2015 | 12.1.2 |
| ISO 42001 2023 | 6.3 |
| MITRE ATT&CK 10 | T1021.005, T1059.006, T1176, T1195.003, T1213, T1213.001, T1213.002, T1495, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1543, T1543.002, T1547.007, T1547.011, T1547.013, T1553, T1553.006, T1564.008, T1601, T1601.001, T1601.002 |
| MPA Content Security Program 5.1 | TS-2.6 TS-5.0 |
| NAIC Insurance Data Security Model Law (MDL-668) | 4.D(2)(f) |
| NIST Privacy Framework 1.0 | PR.PO-P2 |
| NIST 800-53 R4 | CM-3 |
| NIST 800-53 R4 (moderate) | CM-3 |
| NIST 800-53 R4 (high) | CM-3 |
| NIST 800-53 R5 (source) | CM-3 |
| NIST 800-53B R5 (moderate) (source) | CM-3 |
| NIST 800-53B R5 (high) (source) | CM-3 |
| NIST 800-82 R3 MODERATE OT Overlay | CM-3 |
| NIST 800-82 R3 HIGH OT Overlay | CM-3 |
| NIST 800-160 | 3.4.10 3.4.13 |
| NIST 800-161 R1 | CM-3 |
| NIST 800-161 R1 Flow Down | CM-3 |
| NIST 800-161 R1 Level 2 | CM-3 |
| NIST 800-161 R1 Level 3 | CM-3 |
| NIST 800-171 R2 (source) | 3.4.3 |
| NIST 800-171 R3 (source) | 03.04.02.b 03.04.03.a |
| NIST 800-171A R3 (source) | A.03.04.03.d[01] A.03.04.03.d[02] |
| NIST 800-172 | 3.13.2e |
| NIST 800-207 | NIST Tenet 5 |
| NIST CSF 2.0 (source) | ID.RA-07 |
| PCI DSS 4.0.1 (source) | 1.2.2 6.5 6.5.1 6.5.2 6.5.3 12.4.2 |
| PCI DSS 4.0.1 SAQ A-EP (source) | 1.2.2 6.5.1 6.5.2 |
| PCI DSS 4.0.1 SAQ C (source) | 6.5.1 6.5.2 |
| PCI DSS 4.0.1 SAQ D Merchant (source) | 1.2.2 6.5.1 6.5.2 6.5.3 |
| PCI DSS 4.0.1 SAQ D Service Provider (source) | 1.2.2 6.5.1 6.5.2 6.5.3 12.4.2 |
| TISAX ISA 6 | 5.2.1 |
| SCF CORE Mergers, Acquisitions & Divestitures (MA&D) | CHG-01 |
| SCF CORE ESP Level 1 Foundational | CHG-01 |
| SCF CORE ESP Level 2 Critical Infrastructure | CHG-01 |
| SCF CORE ESP Level 3 Advanced Threats | CHG-01 |
US (23)
| Framework | Mapping Values |
|---|---|
| US C2M2 2.1 | ASSET-4.A.MIL1 ASSET-4.G.MIL2 ARCHITECTURE-5.H.MIL3 |
| US CERT RMM 1.2 | ADM:SG3.SP2 TM:SG4.SP2 TM:SG4.SP3 |
| US CISA CPG 2022 | 2.Q |
| US CMMC 2.0 Level 2 (source) | CM.L2-3.4.3 |
| US CMMC 2.0 Level 3 (source) | CM.L2-3.4.3 |
| US CMS MARS-E 2.0 | CM-3 |
| US DHS CISA TIC 3.0 | 3.UNI.CMANA |
| US FDA 21 CFR Part 11 | 11.10 11.10(k) 11.10(k)(1) 11.10(k)(2) |
| US FedRAMP R4 | CM-3 |
| US FedRAMP R4 (moderate) | CM-3 |
| US FedRAMP R4 (high) | CM-3 |
| US FedRAMP R5 (source) | CM-3 |
| US FedRAMP R5 (moderate) (source) | CM-3 |
| US FedRAMP R5 (high) (source) | CM-3 |
| US GLBA CFR 314 2023 (source) | 314.4(c)(7) |
| US HIPAA Administrative Simplification 2013 (source) | 164.308(a)(1)(i) |
| US HIPAA Security Rule / NIST SP 800-66 R2 (source) | 164.308(a)(1)(i) |
| US IRS 1075 | CM-3 |
| US NERC CIP 2024 (source) | CIP-003-8 1.1.7 |
| US NISPOM 2020 | 8-103 8-104 8-311 8-610 |
| US NNPI (unclass) | 4.3 |
| US - CA CCPA 2025 | 7123(c)(4)(C) 7123(c)(5)(D) 7123(c)(5)(E) |
| US - TX TX-RAMP Level 2 | CM-3 |
EMEA (17)
| Framework | Mapping Values |
|---|---|
| EMEA EU EBA GL/2019/04 | 3.4.4(37) 3.6.3(75) 3.6.3(76) |
| EMEA EU DORA | 9.4(e) |
| EMEA EU NIS2 Annex | 5.1.7(d) 6.10.2(d) 6.4.1 6.4.4 6.6.1 |
| EMEA Austria | Sec 14 Sec 15 |
| EMEA Belgium | 16 |
| EMEA Germany Banking Supervisory Requirements for IT (BAIT) | 8.4 |
| EMEA Germany C5 2020 | DEV-03 DEV-08 |
| EMEA Israel CDMO 1.0 | 10.6 14.6 14.7 |
| EMEA Saudi Arabia IoT CGIoT-1 2024 | 1-5-3 |
| EMEA Saudi Arabia ECC-1 2018 | 1-6-2 |
| EMEA Saudi Arabia OTCC-1 2022 | 1-5 1-5-1 1-5-2 |
| EMEA Saudi Arabia SAMA CSF 1.0 | 3.3.7 |
| EMEA South Africa | 19.1 19.2 |
| EMEA Spain BOE-A-2022-7191 | 21.1 |
| EMEA Spain 311/2022 | 21.1 |
| EMEA Spain CCN-STIC 825 | 7.3.5 [OP.EXP.5] |
| EMEA UK DEFSTAN 05-138 | 2404 |
APAC (7)
| Framework | Mapping Values |
|---|---|
| APAC Australia ISM June 2024 | ISM-1211 |
| APAC India SEBI CSCRF | PR.IP.S3 |
| APAC Japan ISMAP | 12.1.2 12.1.2.11.PB |
| APAC New Zealand HISF 2022 | HHSP18 HML18 HSUP16 |
| APAC New Zealand HISF Suppliers 2023 | HSUP16 |
| APAC New Zealand NZISM 3.6 | 6.3.6.C.01 |
| APAC Singapore MAS TRM 2021 | 7.5.1 7.5.2 7.5.3 7.5.4 7.5.5 7.5.6 7.5.7 |
Americas (4)
| Framework | Mapping Values |
|---|---|
| Americas Bermuda BMACCC | 6.1 |
| Americas Canada CSAG | 4.17 4.20 6.11 |
| Americas Canada OSFI B-13 | 2.5 2.5.1 |
| Americas Canada ITSP-10-171 | 03.04.02.B 03.04.03.A |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to facilitate the implementation of a change management program.
Level 1 — Performed Informally
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes.
- IT personnel use an informal process to:
- Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services.
- Requests for Change (RFC) are submitted to IT personnel.
- prior to changes being made, RFCs are informally reviewed for cybersecurity and data privacy ramifications.
- Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change.
Level 2 — Planned & Tracked
Change Management (CHG) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management.
- Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC).
- A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability.
- A CAB, or similar function, reviews RFCs for cybersecurity and data privacy ramifications.
- A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes.
- Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services.
- Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly.
Level 3 — Well Defined
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity and data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes.
- The Chief Information Security Officer (CISO), or similar function with technical competence to address cybersecurity concerns, analyzes the organization's business strategy to determine prioritized and authoritative guidance for Change Management (CM) practices.
- The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization, including CM as part of a broader operational plan.
- A Governance, Risk & Compliance (GRC) team, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data with regards to CM.
- A steering committee is formally established, to provide executive oversight of the cybersecurity and data privacy program, including CM, which establishes a clear and authoritative accountability structure for CM operations.
- An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management.
- ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets.
- Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services.
- A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently.
- The CM function has formally defined roles and associated responsibilities.
- Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC).
- A Change Advisory Board (CAB), or similar function:
- IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible.
Level 4 — Quantitatively Controlled
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
- Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
- Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
- Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
- Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
- Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to facilitate the implementation of a change management program.
Assessment Objectives
- CHG-01_A01 configuration change control activities are coordinated and overseen by organization-defined configuration change control element.
- CHG-01_A02 configuration change decisions associated with the system are documented.
- CHG-01_A03 approved configuration-controlled changes to the system are implemented.
- CHG-01_A04 the time period to retain records of configuration-controlled changes is defined.
- CHG-01_A05 proposed configuration-controlled changes to the system are reviewed.
- CHG-01_A06 the configuration change control element responsible for coordinating and overseeing change control activities is defined.
- CHG-01_A07 the frequency at which the configuration control element convenes is defined.
- CHG-01_A08 configuration change conditions that prompt the configuration control element to convene are defined.
- CHG-01_A09 the types of changes to the system that are configuration-controlled are determined and documented.
- CHG-01_A10 proposed configuration-controlled changes to the system are approved or disapproved with explicit consideration for cybersecurity / data privacy impact analyses.
- CHG-01_A11 records of configuration-controlled changes to the system are retained for an organization-defined time period.
- CHG-01_A12 activities associated with configuration-controlled changes to the system are monitored.
- CHG-01_A13 activities associated with configuration-controlled changes to the system are reviewed.
- CHG-01_A14 the configuration control element convenes organization-defined criteria.
- CHG-01_A15 change management operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
- CHG-01_A16 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support change management operations.
- CHG-01_A17 responsibility and authority for the performance of change management-related activities are assigned to designated personnel.
- CHG-01_A18 personnel performing change management-related activities have the skills and knowledge needed to perform their assigned duties.
Evidence Requirements
- E-CHG-02 Charter - Change Control Board (CCB)
-
Documented evidence of the organization's Change Control Board (CCB) charter and mission to govern the organization's change control processes.
Change Management
Technology Recommendations
Micro/Small
- VisibleOps (https://itpi.org)
- ITIL 4 (https://axelos.com)
Small
- VisibleOps (https://itpi.org)
- ITIL 4 (https://axelos.com)
Medium
- VisibleOps (https://itpi.org)
- ITIL 4 (https://axelos.com)
Large
- VisibleOps (https://itpi.org)
- ITIL 4 (https://axelos.com)
Enterprise
- VisibleOps (https://itpi.org)
- ITIL 4 (https://axelos.com)