ISO 27001 Control 8.32: Change Management

How to Make Changes Without Breaking (or Weakening) Your Security

ISO 27001 Control 8.32 Change management is about one core idea:

Every change to systems, infrastructure and applications should be planned, reviewed, tested, approved and documented so you don’t accidentally introduce outages or security holes.

It ties tightly into:

  • 8.25–8.29 (secure development and security testing)
  • 8.31 (separation of development, test and production environments)
  • Your wider IT change / release process (often via ITSM tools)

This guide turns Control 8.32 into a practical, implementable process you can follow in real life, not just for the sake of the audit.


What ISO 27001 Control 8.32 Actually Expects

In plain language, ISO 27001 Control 8.32 – Change management – expects you to:

  • Have a documented change process for systems, applications and infrastructure.
  • Ensure all significant changes go through planning, risk assessment, testing, approval and controlled deployment.
  • Consider security and continuity as part of every change (not as an afterthought).
  • Keep records so you can see who changed what, when, why and with what result.
  • Treat production as special – changes are tested in non-production first.
  • Handle emergency changes in a controlled way, with review afterwards.

Auditors will usually pick a few changes at random and say:
“Show me how this went through your change process.”

Your evidence is what demonstrates this control.


Step 1 – Decide What Counts as a “Change” and Classify It

Start by being clear on what you treat as a “change”. I usually suggest three simple categories:

  1. Standard changes
    • Low-risk, repeatable, pre-approved (e.g. adding a user to a standard role, routine OS patching following a tested pattern).
    • Follow a predefined, documented workflow.
  2. Normal changes
    • Anything non-trivial that could affect availability, integrity, confidentiality or performance.
    • Require planning, risk assessment, testing, approval and scheduling.
  3. Emergency changes
    • Needed urgently to fix an incident or critical vulnerability.
    • Follow a shortened approval path, but are still recorded and reviewed afterwards.

Write this into a short Change Management Procedure so people know which route to use.


Step 2 – Design a Simple Change Workflow (for Normal Changes)

Your change process doesn’t have to be bureaucratic – but it does need to be consistent.

A good minimal flow is:

1. Raise and describe the change

  • What is being changed?
  • Why is the change needed (business and/or security drivers)?
  • Which systems, data and users are affected?

Capture this in your ITSM tool or change log.

2. Plan and assess risk

  • Identify technical and security impact
    • Could this affect confidentiality, integrity or availability?
    • Any impact on logging, monitoring, backup or incident response?
  • Consider dependencies
    • Other systems, integrations, third parties, licences, firewall rules, certificates, etc.
  • Define back-out / rollback
    • What you will do if it goes wrong, and how you’ll know it has gone wrong.

3. Get the right approvals

  • Assign a change owner.
  • Get approvals from:
    • A technical owner (e.g. system owner / lead engineer), and
    • A business owner where relevant, and
    • A security reviewer for higher-risk changes.

Role-based approval (rather than “that one helpful person”) keeps it clean and auditable.

4. Test in a non-production environment

Link this to your separate dev / test / staging environment (Control 8.31):

  • Test functionality – does it do what it should?
  • Test security – controls still work, no new holes introduced (Control 8.29).
  • Confirm performance and compatibility where relevant.

Record where and how it was tested, and the outcome.

5. Plan and schedule deployment

  • Choose a sensible maintenance window (if there is risk of downtime).
  • Make sure relevant teams (IT, support, security, business) are informed in advance.
  • Confirm who will:
    • Execute the change
    • Monitor during and after
    • Make the call to rollback if necessary

6. Implement and verify

  • Implement the change according to the agreed plan.
  • Perform post-change checks:
    • Is the service up?
    • Are security controls working (auth, logging, access controls, firewalls)?
    • Any unexpected alerts or side-effects?

7. Close and record

  • Update the change record with:
    • Implementation date and time
    • Who implemented it
    • Results of post-change tests
    • Whether a rollback was needed
    • Any follow-up actions

This is what gives you traceability for ISO 27001.


Step 3 – Handle Emergency Changes Safely

Emergency changes are where many organisations quietly bypass security.

Rather than pretending they never happen, define a safe shortcut:

  • Clear definition of what qualifies as an emergency (e.g. critical incident, active exploit, severe business impact).
  • Minimal but real authorisation (e.g. duty manager + on-call technical lead).
  • Still logged as a change, even if raised after implementation in a true crisis.
  • Post-implementation review:
    • Was the emergency approach justified?
    • Did it introduce any new risks?
    • Do we need follow-up hardening, documentation or testing?

That way, you retain control and evidence, even when moving quickly.


Step 4 – Make Production Special

Change management and environment separation are two sides of the same coin.

To align Control 8.32 with 8.31:

  • No direct editing in production
    • Changes are deployed via controlled mechanisms (CI/CD, configuration management tools, formal scripts).
  • Everything major tested before live
    • New systems and major changes must pass through a test or staging environment first.
  • Production changes logged and tracked
    • Firewalls rules, OS changes, database config, application settings – not just code.
  • Use controlled deployment strategies
    • Phased rollouts, canary releases, blue–green deployments for higher-risk changes.
    • Always with monitoring and a defined rollback plan.

The message is: production isn’t a sandpit – it’s governed.


Step 5 – Embed Security into Every Change

Control 8.32 sits in the same family as the secure development controls, so your change process should naturally include security checks.

For each significant change, I recommend:

  • A simple security impact assessment
    • Does this change affect access control, data flows, encryption, logging, monitoring or legal obligations?
    • Does it expose new ports, services or APIs?
  • Security testing where appropriate
    • Static or dynamic checks for application changes.
    • Vulnerability scanning or configuration checks for infrastructure changes.
  • Patch and update management under change control
    • Security patches still need risk assessment, testing (even if shortened) and record-keeping.
  • Update of supporting documents
    • Network diagrams, asset inventories, procedures, incident response plans, recovery steps.

That’s how you show that changes preserve or improve security, rather than undermining it.


Step 6 – Strengthen Governance and Accountability

For more complex or higher-risk environments, add some governance structure around the change process:

  • Change Advisory Board (CAB)
    • A small, multidisciplinary group (IT, security, business) that reviews and approves significant or high-risk changes.
    • Focused on impact, risk, timing and readiness to roll back.
  • Role-based access control for changes
    • Separate roles for requesting, approving, implementing and reviewing.
    • Apply least privilege – only those who need to can make changes on critical systems.
  • Version control and configuration management
    • Use source control (e.g. Git) for code and infrastructure-as-code.
    • Tag releases, keep history, and make rollbacks predictable.
  • Change monitoring and alerts
    • Use tooling to detect unexpected changes to key systems (e.g. config drift, unauthorised modifications).

This is what turns change management from “process on paper” into real control in practice.


Step 7 – Use Tools and Automation to Make Life Easier

Good tools make change management more reliable and less painful:

  • ITSM / change tools
    • Use your service desk / ITSM platform to log, approve and track changes.
    • Define workflows for standard, normal and emergency changes.
  • CI/CD pipelines
    • Automate builds, tests, security scans and deployments.
    • Integrate change approvals into the pipeline (e.g. only approved changes can be shipped).
  • Infrastructure as Code (IaC)
    • Define environments and configuration as code so changes are:
      • Repeatable
      • Reviewed (via pull requests)
      • Auditable
  • Automated monitoring of changes
    • Detect unauthorised configuration changes or drift from baseline.

Automation helps you apply Control 8.32 consistently, instead of relying on someone remembering each step manually.


Step 8 – Measure, Review and Improve

Finally, treat change management as a process you can tune over time.

Useful metrics include:

  • Change success rate
    • Percentage of changes implemented without causing incidents or needing rollback.
  • Number of change-related incidents
    • How often issues are traced back to inadequate planning or testing.
  • Mean time to recover (MTTR) from failed changes
    • How quickly you can roll back or fix when things go wrong.
  • Lead time for changes
    • How long it takes from request to deployment – useful to balance control vs agility.

Use post-implementation reviews and periodic process reviews to refine:

  • Where the process is too heavy for low-risk changes.
  • Where it’s too light for high-risk areas.
  • Where automation could take friction away without losing control.

Quick Implementation Checklist for ISO 27001 Control 8.32

A simple way to see where you stand:

  • There is a documented change management procedure that covers systems, applications and infrastructure.
  • Changes are classified (e.g. standard, normal, emergency) with appropriate workflows for each.
  • All non-trivial changes go through planning, risk assessment, approval, testing and controlled deployment.
  • Production changes are tested in a separate environment first (linked to Control 8.31).
  • Security impact is explicitly considered for relevant changes, with security testing built in (linked to 8.25–8.29).
  • Emergency changes are still logged, authorised (even quickly) and reviewed afterwards.
  • Change records include what, why, who, when, where and the outcome (including rollback if used).
  • There is clear segregation of duties around who can approve and implement changes on critical systems.
  • Patch and update management runs through the same change process, proportionate to risk.
  • Metrics (success rate, change-related incidents, MTTR) are tracked and used to improve the process over time.

If you can walk through a real change and show that it followed this kind of structured, security-aware path, you’ll have strong evidence for ISO 27001 Control 8.32 – and, more importantly, far fewer nasty surprises when changes go live.