Auditing Change Management
Auditing Change Management
CONTROLS ASSESSMENT
CHECKLIST
Following are the important documents that IS auditor need to collect from relevant
official of the entity and understand, BEFORE conducting the audit of the change
management process
• Organization Chart.
• Logical and physical process flowcharts and system diagrams.
• IT change management policies and procedures.
• Workflow diagrams depicting the IT change management process.
• Listing of personnel and organization chart(s) showing participants in change
management, process owners, especially those responsible for authorizing,
developing / preparing and implementing changes.
• Naming conventions for application production and QA source, executable,
command language and copy libraries/directories.
• Naming conventions for system software production and QA source, executable,
parameter and command language libraries/directories.
• Information regarding third-party service providers involved in the process, including
relevant SLAs and contracts.
• Inventory and descriptions of production environment elements in change
management scope (for example, network devices, servers, libraries, databases
…contd
• Sample reports showing how change management request is lodged, and how
change management process is escalated including how the said reporting is done
i.e., metrics, standards, and service level commitments are reported to
management.
• Service desk problem reports and analyses.
• Most recent self-assessment, results and action plans.
• A report listing the total number of changes during time period under review (e.g.,
last 6 months):
• Hardware: emergency/non-emergency
• Software: emergency/non-emergency.
• (Electronic) copy of all change management logs and forms.
• Change reviewer assignment list
• Current vendor documentation for any library management or change control
software in use.
Change Status
Open Initial status upon completing forms and submitting to
Change Manager
Reviewed Updated status after reviewers have assessed change
and provided feedback (prior to CCB decision)
Approved Updated status after CCB has discussed change and
approved / scheduled change for implementation
Rejected Updated status after CCB has discussed change and
denied the request
Failed Updated status after change implementation has been
attempted and failed
Implemented Updated status after changed implementation has been
successful
Closed Updated status after change has been reviewed for
closure by the CCB.
…contd
Change request
• The Change Request (CR) form is completed and signed by department / individual
requesting a change.
• After appropriate business approvals / sign-offs have been acquired, the CR is
forwarded to the Change Manager or equivalent
Change manager
• The Change Manager validates the CR for completeness and logs the CR information
into the Change Control Log for tracking. Incomplete CR’s are returned to the
requestor for update and re-submission.
• The Change Manager evaluates the nature of the request and makes preliminary
assignments as to Change Type, Change Priority and Change Impact.
Change reviewer
• The CR is forwarded to the appropriate Change Reviewer(s) to assess the Change
impact.
• The Change Reviewer(s) evaluate the request and describe how the change impacts
the infrastructure and other related components. In many cases, the original change
requestor becomes part of the impact assessment process to provide additional
input and guidance. In addition, the change reviewer(s) also validates the change
priority and change type. (The Change Impact Table, Change Priority Table can be
used as tools to assess the change.
…contd
• Change Reviewer(s) respond within the timeframe specified by the Change Manager.
Timeframe is dependent on the priority of the request.
• The Change Reviewer(s) provide feedback to the Change Manager to update the
Change Control Log and provide the status of the CR to the requestor.
Change Implementer
• The CCB approves or rejects the change request documenting reasons for the
decision. Approved changes are scheduled for staging and production
implementation. The Change Manager updates the Change Control Log and provides
the final status to the requestor.
• If the schedule changes (request delays or changes in priorities) the CCB review the
impact and reschedules the change at the next CCB meeting.
• Scheduled change requests are released to the staging platform and staging tests are
performed as per the implementation and test plans by the Change Implementer.
(Staging tests include, but are not limited to: installation scripts, data conversion,
load/stress, rollback/recovery, fail-over, etc. The Change Implementer signs off on
the results of the testing of each report.)
…contd
• Staging test results are reviewed with the CCB at the next CCB meeting. The results
are reviewed by re-examining the impact assessments verifying that each impact has
been tested for and/or verified by the Change Implementer(s). Successful staging
test results are released for Production Implementation. The Change Manager
updates the Change Control Log with the status.
• Production Implementation results are reviewed with the CCB at the next CCB
meeting. Successful Implementation results recorded in the Change Control Log.
• On a periodic basis, the Change Manager produces a report to communicate all
implementations to all involved groups through a standard distribution list. The
Change Manager also reviews the Change Control Log and Change Request Forms to
analyze for trends on type, frequency and size of changes.
Change priority and impact table
Change Priorities
Priority 1 - Emergency Causes loss of service or severe usability problems to a large number of
users, or some equally serious problem. Immediate action is required.
(Emergency changes) Resources are allocated immediately to implement authorized change.
Impact - Major Typical situations are virus attacks, server security violations from outside
the enterprise (through internet / firewall) or crashes of mission critical
systems. Implementation in the production environment has priority against
all other scheduled and pending activities of the required staff. The
implemented change must still be logged by the change manager and
reported to the CCB.
Priority 2 - High Priority Severely affects some users or impacts a large number of users. Typically
given the highest priority when being considered by the CCB for staging
(Normal change) and implementation scheduling. Typical situations for this level of priority
Impact - Major are the preventive protection (e. g. against new viruses) or fixing poorly
developed and installed mission critical systems. All information of the
change request form has to be delivered and tests in the staging
environment have to be performed. The CCB may evaluate scheduling of
the change outside of the next scheduled release or upgrade.
Priority 3 - Medium No severe impact but does require resources for both staging and
Priority implementation. Typically is assigned for scheduled maintenance changes
and/or functionality improvements to applications. Preventive fixes or
(Normal change) improvements on the IT infrastructure (e. g. required capacity
improvements notified through monitoring processes) are typically allocated
Impact - Medium in this level. No special resources are required for integration testing and
deployment.
Priority 4 - Low Priority A change is justified and necessary but can wait until the next scheduled
release or upgrade. To be allocated resources as schedules permit.
(Standard change) Changes in this level are planned through the defined update cycle for
Impact - Low software releases and hardware upgrades or the implementation plans of
new services
Impact analysis criteria
When Change reviewer or CCB are assessing/analyzing the impact of the change under
consideration, following aspects should be considered:
Aspect Description
Business congruence and Assess statements as to regulatory or mandated requirements
Benefits
– cost reduction potential
– revenue generation potential
– improvement of business processes
– improvement to technology infrastructure (efficiency, effectiveness)
Cost/Effort Estimates Cost and effort /resource estimates required to implement the change
Interdependencies Other projects or change requests which depend upon this request
and/or are required for successful implementation
Performance and Capacity Implications on infrastructure performance and capacity of change
Risk Implications of failure of the change based on size and scope of the
request
Security Implications for user or system security
Technical information Sufficiency of the technical information available to assess the change
The emergency change procedure supports the implementation of urgent fixes or updates
to the production platforms of the IT infrastructure. Emergency changes follow a
streamlined process that still provides for review, approval and logging of changes. To
speed processing recovery, many details are captured after the fact.
Change request
• The Emergency Change Request (ECR) form is completed by any person /
department requesting an emergency change to the entity IT Infrastructure and is
submitted to the Change Reviewer.
…contd
Change reviewer
• The Change Reviewer evaluates the nature of the request and evaluates the urgency
of the change using the definitions of Change Type, Change Impact and Change
Priority. In many cases, the original change requestor becomes part of the impact
assessment process to provide additional input and guidance. In most cases, the
Change Reviewer for an ECR is the Change Requestor’s supervisor or an assigned
resource within the IT Infrastructure.
• The Change Reviewer(s) also evaluates how the change impacts the infrastructure.
The Change Reviewer may elect to involve other members of the Infrastructure
Group or the wider CCB if the change is evaluated as Major Impact (multiple
systems, etc.).
• The Change Reviewer(s) approves the ECR and updates the ECR Log to record key
information regarding the change. The ECR is forwarded to the Change
Implementers for implementation. (Note: the Change Implementers may be the
original Change Requestor).
…contd
Change implementer
• The Change Implementer completes the change and provides information to the
Change Reviewer to update and close out the ECR Log and Change Management
documentation.
• The Change Reviewer forwards the ECR log to the Change Manager for update to the
Change Control Log. The Change Manager provides an update status to the CCB
during the next scheduled CCB meeting.
Change request – Change reviewer (No entry in ECCL, just approval) – Change
implementer – Change manager (change control log) - CCB
Presentation Overview
• Introduction. What is Change management; Why is it important;
Change management concepts (Types of changes, Sources of changes,
Scope of changes); About the Checklist
Risks/Exposure(s)
Inappropriate and unapproved changes could result in bugs, errors
and unpredictable business solutions that would not meet the
users' requirements.
Audit steps/tests
For sample of changes, review that change request is lodged using a standard
change request form (which may be electronic). At a minimum, the form should
include:
• A unique control number (preferably system generated) to allow system
administrator to easily track the status of the change
• The requestor's name, department
• Date of request,
• Date the change is needed,
• Reason for the change,
• Name of modules/applications/systems that need to be changed.
• A cost justification analysis
• Expected Benefits of the change.
• Priority of the request,
• A thorough description of the Change request,
• A description of any anticipated effects on other systems or programs,
• Fallback procedures in case the changes cause the failure of the system.
• Evidence that change request form has been reviewed and authorized by
user management/Head of the relevant department.
…contd
Review whole case of each change selected in above sample, and ensure that following
activities are evident from the case:
• Create and record
• Review
• Assess and evaluate
• Authorize
• Plan
• Coordinate
• Review
• Close
Import the complete population of change request in data analysis application such as
ACL, and ensure that data analysis confirms that business process as identified in earlier
part is followed, and that audit trail is complete. Also perform the following tests:
• Data integrity verification
• Completeness
• Sequence
• Validity
• Duplicate
• Logical relationship
• Trend analysis for systems having unusually high number of changes
…contd
Risks/Exposure(s)
Lack of an emergency change process could result in the
unauthorized migration of code into production. This may result in
delays in production processing, hence, user dissatisfaction.
Further, emergency changes may bypass and/or compromise
existing change controls
Audit steps/tests
Determine that IT change management policies and procedures define parameters for
emergency changes. Existing policies and procedures must control these changes when
they circumvent the normal process of technical, operational and management
assessment prior to implementation.
Select a sample of emergency changes during the audit period and ensure that:
• The change was needed for a true emergency i.e., the change was not masked as
emergency change
• Emergency procedures were followed.
• Procedures require that emergency changes be supported by appropriate
documentation (e.g., evidence of management approval, code review) within one
business day after the emergency is resolved.
• Emergency changes are made through the use of emergency Ids. Ensure a process
exists to enable and disable them.
• Ensure an audit trail exists of all emergency ID usage and that it is independently
reviewed.
…contd
Risks/Exposure(s)
Production system may not run effectively and efficiently in
presence of changes that are interfering with each other.
Audit steps/tests
For sample of changes ensure that there exists control that ensure:
• Standard Changes are implemented periodically as releases
rather than as isolated modifications to the production
environment.
• Normal changes that are lodged by different user departments
are implemented in appropriate sequence with full business
case justification of priority
• Changes that may affect one another are synchronized
appropriately (for example, only one programmer at a time is
modifying a given module).
Control objective
Changes are implemented accurately and as intended. (COBIT AI6)
Risks/Exposure(s)
Lack of a change control process could result in un-tested /
unauthorized migration of code into production. This could result in
delays in production processing, hence, user dissatisfaction. Also,
this could result in unauthorized changes adversely affecting
application processing to produce unintended results.
Audit steps/tests
Risks/Exposure(s)
Information system may come at halt, if not recovered fully from
unsuccessful change, hence affecting daily operations of entity.
Further it may cause inconsistency among existing processes
Audit steps/tests
Risks/Exposure(s)
In case of lack of integration, Production operations may not
recover efficiently from problems caused by changes.
Audit steps/tests
Risks/Exposure(s)
Lack of monitoring and supervision of compliance may lead to
ineffective and inefficient change management process.
Audit steps/tests
Risks/Exposure(s)
Lack of segregation of duties could result in inconsistent and
unauthorized change in production environment affecting the data
integrity.
Audit steps / tests
Review the policies and procedures, and perform walkthroughs along with
interviews, to identify whether the following controls are present in change
management process:
PREVENTIVE CONTROLS:
Change authorization.
• There should exist documentation showing the authorized owners for all the
business processes and supporting IT systems, with assigned levels of
authorizations.
Segregation of duties.
• Documentation showing clear assignment and separation of roles and
responsibilities of the change stakeholders should exist, including change
authorization, scheduling, implementation, and review.
• There should exist clear policies describing the categories and tiers of changes
and the levels of formality, approval, and rigor associated with moving changes
within each category from the initiation to the implementation stage.
• Access to development and test environment should only be allowed to change
preparer and change implementer
• No change should be made in production
• Training and awareness programs to promote a culture of change management.
…contd
Perform a walkthrough to determine following issues, and ensure that the findings remain
relevant to the sample selected:
Determine if programs can be checked out by more than one programmer
simultaneously. Verify a process exists to support concurrent development.
• Does the change management software have a checkout feature?
• Is the feature used?
• If the feature is not used, how are simultaneous checkouts controlled?
Determine if a version control process exists to ensure the correct module was copied
from production.
…contd
Determine how the programmer is made aware of all the modules that need to be
changed.
Ensure history records are kept of code check-ins / outs, and deletions, which are made to
the production library. Determine if a work order number is associated with the history
record (this should be traceable back to the initial request)
Verify a process exists that requires programming management to review the source
documentation or code [if applicable] to ensure changes are appropriate and meet the
departments programming and documentation standards.
Ensure all changes are applied to a copy of the latest production version of code.
Verify code is modified / developed in an area separate from testing and production.
Verify code is tested in staging environment (a testing region which is separate from
development and production).
Determine how code is moved into the staging environment.
…contd
Verify procedures exist to ensure the approved code from the test environment is the
version moved into production.
Determine who is responsible for migration of code into production.
Determine how code is implemented into the production environment.
Determine if a process exists to reconcile changes scheduled for implementation to those
changes actually implemented. Verify who performs this process and how often the
process takes place.
…contd
Import the complete population of change request in data analysis application such as
ACL and ensure that data analysis confirms the segregation of duties and other controls as
mentioned in this checklist
Process Performed by whom Segregated from
Change request User management, See *
IT operations/control group,
System administration.
Change approval Change manager (Chair of CCB) See *
Change preparation Departmental staff of relevant change See *
and testing implementer
Change System administration See *
implementation/ Database administration
deployment to Network administration,
production Network engineering,
SAN administration
Change reviewer R&D Change preparer
Internal Audit and
Quality assurance Change implementer
Designated member of CCB
Change audit Internal Audit , All the rest
External auditors
* The requester, approver, preparer and implementer are NOT performed by same department/ section. Where a member
of these departments is also part of CCB, he is to remain independent of request, approval, preparation and
implementation.
Control objective
A clear audit trail exists within change management process.
Risks/Exposure(s)
Cause of bottlenecks cannot be identified incase error occurs.
Hence problem escalation becomes slow and time consuming
Audit steps/tests
Servers – Windows
(hardware/operating system/utilities)
Networking – LAN
Networking – WAN
Networking – Routers/Hubs
Middleware Tools
Application Server - Oracle
Application – Portal
……………
……………
CCB meeting agenda
Change Request CR Filename Requested By Request Date Department/ Description of Change Environment
Nbr Location
Telephone
Change Priority Change Status Date Change Staging Results Notes Date Implementation
Scheduled Implementers Implemented Results Notes
Elements discussed in Change Control Log
(CCL)
Change Control Log (CCL)
Change Request Number A sequential number assigned to record change
Requested by Name of person requesting change
Request Date Submission date of CR
Department/location telephone Department/location/telephone of change requestor
Reason for change Detailed text describing reasons and benefits to making the
change
Environment(s)
Impacted:
Change Request Status Accepted Rejected
Comments:
Change Implementation
Date of
Implementation
Implementor Sign Off Date
Elements discussed in ECRF
Change Description
Emergency Change Request A sequential number assigned to record change (logged by the Change
Number (ECR) Manager after the fact)
Project Name of the project under which CR is being requested (if applicable)
Change Approvals
Change Request Status of the CR (Accepted, Rejected)
Comments Reasons (if any) from Change Control Board as to status
Change Request ECR Filename Requested By Request Date Department/ Location Telephone
No.