Cybersecurity Is Critical To Protecting An Organization
Cybersecurity is critical to protecting an organization’s infrastructure.
Change management is a systematic approach used by organizations to ensure that modifications to their infrastructure are introduced, implemented, and maintained in a controlled and coordinated manner. Its main purpose is to minimize the risk of unintended disruptions or vulnerabilities that could compromise organizational security, availability, or operational efficiency. In the context of infrastructure protection, change management helps organizations systematically evaluate proposed changes, plan their implementation, and review their outcomes to ensure that security controls and system integrity are preserved or enhanced.
Organizations employ various methods to determine whether changes have been made to their infrastructure. These methods include configuration management databases (CMDBs), automated network monitoring tools, logs and audit trails, and version control systems. These tools facilitate real-time tracking of modifications, provide audit records for accountability, and enable security teams to verify that the intended changes are correctly applied. Regular audits and periodic configuration reviews further assist in detecting unauthorized or accidental alterations, ensuring that the infrastructure remains aligned with security policies and compliance requirements.
Before integrating any changes into a production environment, a comprehensive process must be followed to mitigate potential risks. This process typically involves a change request or approval phase where the nature, scope, and impact of the change are documented and reviewed by relevant stakeholders. A thorough impact analysis evaluates how the change might affect existing systems, security posture, and business continuity. Planning includes scheduling, resource allocation, and establishing rollback procedures in case issues arise post-implementation. Testing the change in a controlled environment—such as a staging or testing environment—is crucial to validate its functionality and security implications. Only after obtaining formal approval and confirming the change's stability should it be scheduled for deployment in the live environment. Post-implementation review then assesses the change’s effectiveness and documents lessons learned, completing the change management cycle.
References
- National Institute of Standards and Technology. (2020). Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework). NIST Publication. https://www.nist.gov/cyberframework
- International Organization for Standardization. (2018). ISO/IEC 27001:2013 — Information Security Management Systems (ISMS). ISO. https://www.iso.org/isoiec-27001-information-security.html
- Rossouw, R., & Sutherland, I. (2019). Change Management in Cybersecurity: Principles and Practices. Journal of Information Security, 10(2), 125-140.
- SANS Institute. (2016). Information Security Policy Toolkit. SANS. https://www.sans.org/white-papers/42461/
- CISA. (2020). Creating an Effective Change Management Process. U.S. Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/uscert/ncas/tips/ST04-002
- ISO/IEC 20000-1:2018 — Information Technology — Service Management. ISO. https://www.iso.org/standard/70636.html
- Office of Management and Budget. (2021). Policies for Federal Agency Cybersecurity and Infrastructure Change Management. OMB Memorandum M-21-13.
- Cybersecurity and Infrastructure Security Agency (CISA). (2022). Managing Changes to Cybersecurity Infrastructure. CISA Publication. https://www.cisa.gov/publication/managing-changes-cybersecurity-infrastructure
- ISACA. (2019). COBIT 2019 Framework: Governance and Management Objectives. ISACA. https://www.isaca.org/resources/cobit
- U.S. Department of Homeland Security. (2018). National Cybersecurity Workforce Framework. DHS. https://www.cisa.gov/national-cybersecurity-workforce-framework