Episode 54: Change Management Processes

Welcome to The Bare Metal Cyber CISA Prepcast. This series helps you prepare for the exam with focused explanations and practical context.
Change management in IT is the formal process used to control and coordinate updates to systems, applications, and infrastructure. Its purpose is to ensure that changes are properly planned, tested, and approved before being implemented, reducing the risk of service disruption, security exposure, or compliance failure. Without structured change control, organizations face a higher likelihood of configuration errors, unauthorized actions, and untraceable incidents. Change management also supports auditability by maintaining documentation and accountability at each step. The CISA exam frequently includes questions on how change control supports organizational objectives, and candidates are expected to recognize weaknesses in change workflows, especially when risk assessments or approvals are missing.
There are three main types of IT changes, each with different control expectations. Standard changes are routine and low risk, such as scheduled patching or pre-approved updates, and they typically follow a streamlined process. Normal changes require full documentation, review, testing, and approval due to their potential impact. Emergency changes are expedited to address urgent problems like security vulnerabilities or critical outages and are often implemented outside of the normal approval timeline. The type of change determines the level of oversight and the documentation required. Auditors are responsible for verifying that changes are accurately categorized and routed through the appropriate control paths, and CISA candidates should expect exam questions that ask them to determine when a change was misclassified or skipped key review steps.
The change management lifecycle follows a consistent series of steps that begin with a formal request. Once a request is logged, the assessment phase evaluates the proposed change's impact, risk level, and technical dependencies. This is followed by the approval step, in which a Change Advisory Board or designated authority reviews the information and determines whether to authorize the implementation. If approved, the change is scheduled and executed, with monitoring in place to track outcomes. After implementation, closure activities include reviewing results, updating documentation, and confirming that the change produced the desired outcome. Auditors review each stage of this lifecycle to verify that procedures were followed and that control evidence was properly recorded and retained.
Risk assessment is a key part of evaluating proposed changes and must consider technical, operational, and business impact. Analysts look at potential service disruption, the likelihood of user complaints, security implications, and the complexity of rolling back the change if it fails. The assessment must account for how critical the affected systems are to business operations and whether compliance requirements could be impacted. Input from technical teams, security officers, and process owners is often required to complete a well-rounded review. Effective assessments include mitigation strategies and fallback plans. Auditors are tasked with evaluating whether the risk evaluations were consistent and whether decision-makers had enough information to make informed approvals.
Change approval is one of the most critical stages in the process. Any non-standard change must be formally authorized before it is implemented, and this typically occurs through a Change Advisory Board that includes representatives from technical, business, and compliance functions. Emergency changes may be implemented immediately but still require retrospective approval and documentation. CAB meetings should be documented, with minutes, decisions, and any dissent clearly recorded. Weak or missing approval procedures are a frequent source of audit findings and exam scenarios. CISA candidates should be able to evaluate approval workflows and identify signs that proper authorization was not followed or bypassed without justification.
Before a change is deployed, it must be thoroughly tested and validated to reduce the risk of failure in the production environment. Testing must take place in systems that mirror production configurations, ensuring that results reflect real-world behavior. Regression testing ensures that unrelated parts of the system are not inadvertently affected. Validation of rollback procedures is required so that teams can quickly reverse changes if something goes wrong. Ideally, testing should include simulated user activity and full transaction workflows to verify that business processes continue to function. Auditors review the existence and completeness of test plans and require evidence that tests were passed and signed off before deployment.
The implementation phase must be executed with care and oversight. Scripts, automation tools, and predefined checklists help ensure consistency and reduce the chance of error. Teams must monitor system logs and key performance metrics during and after deployment to catch exceptions or unintended side effects. Support personnel should be available in case a rollback is required, and communications must be sent to affected users before and after the change. Auditors review records of implementation timing, personnel involved, system monitoring results, and any incidents that occurred during the change window. CISA exam scenarios often involve identifying missing execution evidence or failures in change coordination.
Emergency change procedures are a necessary part of IT operations but are often abused or poorly documented. These changes are intended only for urgent, high-impact situations such as responding to a vulnerability or restoring a failed system. While these changes can be executed quickly, they must be documented afterward, with a full post-implementation review that includes risk evaluation, justification, and any lessons learned. A high volume of emergency changes can indicate deeper issues in planning, resource allocation, or system stability. Auditors frequently flag emergency changes when approval records are missing or when evidence suggests the change was not truly urgent. CISA candidates are expected to assess whether emergency procedures are properly limited and controlled.
Documentation and logging are essential for demonstrating change integrity. Every change must be supported by a complete audit trail, including the original request, risk assessment, test results, approval decisions, implementation logs, and post-deployment verification. Change records should identify who made the change, what was changed, when it occurred, and whether any incidents followed. Logs must be protected against modification and retained for the required compliance period. Cross-referencing change records with incident and problem logs provides insight into whether the change introduced new risks. Auditors assess whether change documentation is consistent, accessible, and linked to broader IT governance frameworks.
For the CISA exam and real-world audits, understanding how to evaluate change management controls is critical. You must be able to identify missing or weak classification, testing, or approval steps and understand how those weaknesses introduce risk. Different types of changes require different levels of rigor, and auditors must confirm that control depth aligns with the level of risk and system impact. Expect exam questions that focus on emergency change justification, rollback planning, or approval authority. Strong change management processes protect system stability, ensure traceability, and support regulatory compliance. As an auditor, your oversight helps organizations manage change safely, efficiently, and with confidence in both outcomes and records.
Thanks for joining us for this episode of The Bare Metal Cyber CISA Prepcast. For more episodes, tools, and study support, visit us at Baremetalcyber.com.

Episode 54: Change Management Processes
Broadcast by