Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

1.3 Domain 1 · General Security Concepts

Change Management

Explain the importance of change management processes and the impact to security

Concept
2
Textbook
3
Reference
4
Real Scenario
5
Hard Choice
6
Common Traps
7
Exam Signal
The Concept

Every unmanaged change is a potential vulnerability. Change management ensures that updates to systems, configurations, and infrastructure are proposed, reviewed, tested, documented, and reversible.

The process: RFC (Request for Change) → Impact AnalysisCAB Approval (Change Advisory Board) → Implementation (during maintenance window) → Backout Plan if needed. Unmanaged changes are among the most common causes of outages and security gaps. Even emergency changes follow an expedited process — never no process.

Business Processes:

  • Approval process — who signs off on the change? Typically the Change Advisory Board (CAB) for standard changes, or an emergency CAB for urgent ones.
  • Ownership — who is responsible for the change from start to finish? Every change has a single owner.
  • Stakeholders — who is affected? Users, other teams, customers, third-party vendors.
  • Impact analysis — what could break? Assess risk to availability, security, performance, and dependent systems.
  • Test results — proof the change works in a non-production environment before touching production.
  • Backout plan — how to reverse the change if it fails. Every change must have one.
  • Maintenance window — when the change will be implemented (scheduled downtime, low-traffic period).
  • Standard operating procedure (SOP) — documented step-by-step instructions for implementation.

Technical Implications:

  • Allow lists / Deny lists — changes may require updating firewall rules, application whitelists, or blocked IP lists.
  • Restricted activities — certain actions (deploying to production, modifying ACLs) may be prohibited during change freezes.
  • Downtime — planned service interruption during implementation.
  • Service / application restart — many changes require restarting services, which impacts availability.
  • Legacy applications — older systems may not tolerate changes to dependencies (libraries, OS patches, protocols).
  • Dependencies — other systems that rely on the changed component. A database schema change can break every application that queries it.

Documentation:

  • Updating diagrams — network diagrams, architecture diagrams, data flow diagrams must reflect the change.
  • Updating policies/procedures — SOPs, runbooks, and configuration baselines must be updated.
  • Version control — track what changed, when, and by whom. Configuration management databases (CMDB) and version control systems (Git).
StepPurposeKey Question
RFC Formally propose the change What do you want to change and why?
Impact Analysis Assess risk before implementation What could break?
CAB Approval Stakeholder review and sign-off Do the benefits outweigh the risks?
Implementation Execute during maintenance window Is there a tested SOP?
Backout Plan Reverse the change if it fails How do we restore to the previous state?
Technical ImplicationWhat It MeansExam Angle
Allow Lists Approved applications, IPs, or domains Changes may require updating allowed entries
Deny Lists Blocked applications, IPs, or domains New threats may require adding blocked entries
Downtime Service unavailable during change Must be planned within maintenance window
Service Restart Applications need restart after changes Impacts availability; must be coordinated
Legacy Apps Older systems may not support changes Dependency conflicts, compatibility issues
Dependencies Other systems relying on changed component Breaking a dependency can cascade failures
Key Takeaway

Every change needs a backout plan. No exceptions. Even emergency changes. The exam will test whether you know that emergency changes follow an expedited change management process — they do NOT skip change management entirely.

A critical zero-day vulnerability is announced. The vendor releases an emergency patch. Your SysAdmin wants to deploy immediately to all production servers.

Scenario
Emergency Patch Deployment
Enterprise · 2,000 users · Zero-day vulnerability · Vendor patch available
SysAdmin"This is a zero-day. It's being actively exploited in the wild. We need to patch right now. I'm pushing to all 40 servers."
Change Manager"I understand the urgency. But what's your backout plan? If this patch breaks our ERP system, how do we reverse it?"
SysAdmin"We don't have time for that. Every hour we wait, we're exposed."
Change Manager"Then we use the emergency change process. Snapshot all servers now — that's your backout plan. Test on one non-critical server first. If it works, roll to production in batches. We can do this in 2 hours instead of 2 days, but we don't skip the process."
Compensating Control

Emergency change process: Take VM snapshots (instant backout plan) → test on one server → deploy in waves → monitor for issues → document after the fact. The process is accelerated, not eliminated. Post-change review happens within 48 hours.

Real Talk — Career Context

In practice, this negotiation happens constantly. Security teams want speed; operations teams want stability. The change management process is the bridge between them. Senior security professionals who understand change management get respected by ops teams — those who don't get blocked by them.

On the exam: "Emergency changes skip change management" is always WRONG. Emergency changes follow an expedited process with retroactive documentation. The exam tests this distinction heavily.

The zero-day patch is ready. Your SysAdmin has not tested it. There is no backout plan documented. The vulnerability is being actively exploited against organizations in your industry. Your CISO asks for your recommendation:

Option A
Push Immediately Without Testing

Fix the vulnerability right now. Accept the risk that the patch might break production. Deal with fallout later. Every minute of delay is exposure.

Option B
Follow Emergency Change Process

Snapshot servers (backout plan), test on staging for 1 hour, deploy in batches during a 2-hour window. Takes 3 hours total but controlled.

Option B is correct — even emergencies need a process

Option B: An untested patch that breaks production is a self-inflicted outage. You've traded a security vulnerability for an availability disaster. The emergency change process takes 3 hours — that's faster than recovering from a botched deployment that took down your ERP at 2 AM with no backout plan.

Option A's kernel of truth: Speed matters. Active exploitation means real risk. But "push untested to 40 servers simultaneously with no rollback" isn't speed — it's recklessness. The emergency process is the fast path. It's just not the reckless path.

On the exam: the answer is always "follow the process." The process can be accelerated, but never skipped entirely. A backout plan is non-negotiable.

Impact Analysis vs. Backout Plan
Impact analysis happens BEFORE the change — "what could go wrong?" Backout plan is for AFTER the change fails — "how do we reverse it?" The exam will describe a scenario and ask which document applies. If the question asks "how to revert a failed deployment" — that's the backout plan. If it asks "what should be assessed before implementation" — that's impact analysis.
Why it's tempting: Both deal with "what if something goes wrong." But one is predictive (before), the other is reactive (after).
Maintenance Window vs. Downtime
A maintenance window is a scheduled period when changes are allowed (e.g., "Saturday 2-6 AM"). Downtime is the actual service interruption that results from the change. You schedule a maintenance window; downtime is what happens during it. Not all maintenance windows result in downtime (some changes are non-disruptive).
Why it's tempting: They overlap in time. But maintenance window is the schedule; downtime is the consequence.
Emergency Changes Skip Change Management
This is ALWAYS wrong on the exam. Emergency changes follow an expedited change management process, not no process. The key differences: approval may come from a smaller emergency CAB (or even a single authorized person), testing may be abbreviated, and documentation may happen retroactively. But a backout plan is still required, and a post-implementation review still occurs.
Why it's tempting: In real life, people do skip the process under pressure. The exam tests the ideal, not the common shortcut.
Exam Signal

Change management questions love the backout plan. If a question describes a failed deployment and asks "which document should have been prepared," the answer is almost always the backout plan. Also watch for: "which process ensures changes are reviewed before implementation?" — that's the CAB/approval process. "What document demonstrates the system can be restored?" — backout plan, not test results.

Quick Check — End of 1.3
A systems administrator wants to deploy a change to production. Which document demonstrates the system can be restored if deployment fails?
  • A Backout plan
  • B Impact analysis
  • C Test procedure
  • D Approval procedure

Correct: A. The backout plan specifically documents how to restore the system to its previous state if a change fails. Impact analysis (B) assesses risk before the change. Test procedure (C) validates the change works in a non-production environment. Approval procedure (D) documents who signed off. Only the backout plan addresses "how to restore if it fails."

Disclaimer: This content is provided for educational and exam preparation purposes only. It is not official CompTIA content, is not endorsed by CompTIA, and does not guarantee exam success. All practice questions are original and based on published exam objectives. Always refer to the official CompTIA Security+ Exam Objectives as your primary reference.