0% found this document useful (0 votes)
46 views23 pages

State of Maine Department of Administrative & Financial Services Office of Information Technology

This document establishes the State of Maine Office of Information Technology's (OIT) change management policy and procedures. It outlines roles and responsibilities for managing changes to the OIT operating environment, including establishing a Change Advisory Board (CAB) and procedures for processing standard and emergency change requests. The goal is to ensure changes are implemented safely and do not compromise the confidentiality, integrity or availability of OIT systems, in accordance with industry best practices and standards from NIST.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views23 pages

State of Maine Department of Administrative & Financial Services Office of Information Technology

This document establishes the State of Maine Office of Information Technology's (OIT) change management policy and procedures. It outlines roles and responsibilities for managing changes to the OIT operating environment, including establishing a Change Advisory Board (CAB) and procedures for processing standard and emergency change requests. The goal is to ensure changes are implemented safely and do not compromise the confidentiality, integrity or availability of OIT systems, in accordance with industry best practices and standards from NIST.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

State of Maine

Department of Administrative & Financial Services


Office of Information Technology

Change Management Policy and Procedures


Change Management Policy and Procedures

Table of Contents

Table of Contents ......................................................................................................................................... 2

1.0 Document Purpose: ............................................................................................................................... 3

2.0 Applicable Laws/Guidance:................................................................................................................ 3

3.0 Scope: ................................................................................................................................................... 3

4.0 Policy Conflict: ..................................................................................................................................... 3

5.0 Roles and Responsibilities: ................................................................................................................... 3

6.0 Management Commitment: .................................................................................................................. 6

7.0 Coordination Among Agency Entities:................................................................................................. 6

8.0 Compliance: .......................................................................................................................................... 7

9.0 Procedures: ........................................................................................................................................... 7

10.0 Document History and Distribution:................................................................................................... 13

11.0 Document Review: ............................................................................................................................. 13

12.0 Records Management: ........................................................................................................................ 13

13.0 Public Records Exceptions: ................................................................................................................ 13

14.0 Definitions: ......................................................................................................................................... 14

Appendix A: Standard Change Classification Template


Appendix B: Standard Change Classification Process and Checklist
Appendix C: Security Impact Analysis
Appendix D: Normal Change RFCs: Required Information in Footprints

Page 2 of 23
Change Management Policy and Procedures

1.0 Document Purpose:

The purpose of this document is to establish the Maine Office of Information


Technology’s (OIT) Change Management (ChM) policy and procedures. This policy
ensures that any changes to the OIT operating environment are managed through a
process that reflects best practices for the implementation of ChM within the OIT
environment in a manner that safeguards the confidentiality, integrity and
availability of OIT’s information systems.

2.0 Applicable Laws/Guidance:

This policy addresses industry standards and best practices as defined by the
National Institute of Standards and Technology (NIST) Special Publication 800-53
(configuration management family of controls), Federal Information Processing
Standards (FIPS) and Special Publications (SP), which stress the importance of
ensuring that information systems document and assess the potential impact that
proposed system changes have on the operational processes and security posture of
the overall system.

3.0 Scope:

This policy applies to all State of Maine employees and contractors (collectively
referred to as personnel in this document) with access to:

3.1 Executive Branch Agency information assets, irrespective of location; and

3.2 Information assets from other State government branches that use the State
network.

4.0 Policy Conflict:

If this policy conflicts with any law or union contract in effect, the terms of the
existing law or contract prevail.

5.0 Roles and Responsibilities:

5.1 The Chief Information Officer is responsible for:

5.1.1 Ultimately approving OIT’s ChM policies and procedures.


5.1.2 Appointing two members of OIT senior management with expertise in
change management to serve as CAB Co-Chairs.

Page 3 of 23
Change Management Policy and Procedures

5.2 The Division Directors are responsible for:

5.2.1 Appointing two individuals, one member and one alternate, from each
division with expertise in their respective technology areas to serve on
the Change Advisory Board (CAB).

5.3 The CAB Co-Chairs are responsible for:

5.3.1 Ensuring the CAB adheres to ChM procedures and is robustly staffed with
sufficient IT and stakeholder representatives;

5.3.2 Determining the schedule for CAB members to serve as CAB Facilitators
on a rotating basis;

5.3.3 Approving Standard Change Classification Template requests for use in


the Standard Change Catalog in Footprints;

5.3.4 Reviewing the Standard Change Catalog in Footprints on an annual basis,


or earlier as required, to ensure they remain current and valid;

5.3.5 Selecting E-CAB members to serve on an ad hoc basis on the E-CAB, as the
nature of the emergency requires;

5.3.6 Responding to emergency RFCs (E-RFCs) by standing up the E-CAB to


conduct an accelerated ChM process; and

5.3.7 Providing conflict resolution as required at CAB meetings and, in the


event the CAB is unable to reach a decision on an RFC, escalating the issue
to the CIO; and
5.3.8 Appointing a designee to act on their behalf, as necessary, with any
further designation requiring approval of the CIO.1

5.4 The CAB members are responsible for:

5.4.1 Authorizing all changes throughout the development and operational


lifecycle of products and systems after ensuring the changes are held to
approved criteria before implementation;

5.4.2 Ensuring that changes are processed in an orderly and consistent


manner;

1
The CAB Co-Chairs are responsible for the actions taken by a designee on their behalf within the
scope of this policy.

Page 4 of 23
Change Management Policy and Procedures

5.4.3 Providing cross-functional visibility to RFCs that leverages the collective


understanding of the impact across the organization;

5.4.4 Overseeing how proposed changes could affect the functionality and
secure state of the information system based upon the CI’s assessment;
and

5.4.5 Providing support for the Major Incident Procedure plan2, when
applicable, as directed by the CAB Co-Chairs, if the back-out plan fails.

5.5 The CAB Facilitator is responsible for:

5.5.1 Leading the CAB meetings on a predetermined rotating basis, as


determined by the CAB Co-Chairs;

5.5.2 Preparing the CAB meeting agenda for distribution to CAB members,
including all Open RFCs that are complete and have met the CAB
submission deadline;

5.5.3 Prioritizing open RFCs on the agenda for the CAB meeting based on the
security impact level identified from the Security Impact Analysis3
(Appendix C);

5.5.4 Serving as a ChM gatekeeper by reviewing RFCs for completeness,


appropriate approvals, and compliance to ChM procedure; and

5.5.5 Ensuring that the Standard Change dashboard in Footprints is updated


weekly and reviewed by CAB members at before the weekly CAB meeting.

5.6 The CAB Emergency Committee (E-CAB) members are responsible for:

5.6.1 Serving on an ad hoc basis at the request of the CAB Co-Chairs in


response to emergency RFCs (E-RFCs);

5.6.2 Providing subject matter expertise to the CAB Co-Chairs as required to


assist with performing the Security Impact Analysis (SIA) of Emergency
RFCs (Appendix C); and

5.6.3 Assisting with the Post Implementation Review of any authorized


Emergency RFCs.

2
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/major-incident-procedure.pdf
3 Security Impact Analysis satisfies the NIST configuration management family of controls (CM-4).

Page 5 of 23
Change Management Policy and Procedures

5.7 The Change Requestors (CR) are responsible for:

5.7.1 Owning the RFC from creation to closure, which includes:

5.7.1.1 Generating and submitting the RFC to start the process;

5.7.1.2 Providing all of the details that must be included in the RFC (see
Appendix D); and
5.7.1.3 If necessary, assigning the RFC to a Change Owner (CO) in
Footprints who is better equipped to manage the requirements
of the RFC and takes over responsibility for the RFC from
implementation to validation post-CAB.

5.7.2 Attending CAB as necessary to assist the CAB with deliberation on the
RFC; and

5.7.3 Shepherding the authorized RFC through implementation and validation


post-CAB.

5.8 Change Owners (CO) are responsible for:

5.8.1 Once assigned by a CR in Footprints, assuming all the CR’s responsibilities


with respect to owning the RFC from creation to closure, including:

5.8.1.1 Completing all the required information for the RFC in Footprints
necessary to meet the CAB submission deadline (see Appendix
D);

5.8.1.2 Attending CAB as necessary to assist the CAB with deliberation


on RFC; and

5.8.1.3 Shepherding the authorized RFC through implementation and


validation post-CAB.

6.0 Management Commitment:

The State of Maine is committed to following this policy and the procedures that
support it.

7.0 Coordination Among Agency Entities:

The State of Maine recognizes the critical need for contingency planning that meet
our unique requirements and relate directly to our mission, size, structure, and
functions. We further recognize that effective change management meets and
surpasses the service expectation and business needs of OIT’s customers and

Page 6 of 23
Change Management Policy and Procedures

partner agencies and relies on a collaborative partnership between State Agencies


and OIT.

8.0 Compliance:

For State of Maine employees, failure to comply with the procedures identified in
this plan may result in progressive discipline up to and including dismissal. For non-
State of Maine employees and contractors, failure to comply may result in removal
of the individual’s ability to access and use State of Maine data and systems.
Employers of non-State of Maine employees will be notified of any violations.

9.0 Procedures:
The following change management procedures apply to all changes to the IT
infrastructure and production environment, excluding exempt changes, to ensure
the appropriate steps occur prior to the implementation of change request.

9.1 Initiate the RFC (Pre-CAB):

9.1.1 Access and record keeping requirements (CM-5):

9.1.1.1 All documentation associated with ChM is maintained in the


Footprints ticketing system.

9.1.1.2 Unless the CR assigns the request to a different “assigned to”


individual (see Change Owner), the CR must provide all of the
required documentation within Footprints for an RFC to be
considered complete (see Appendix D for required information
for the RFC in Footprints); and

9.1.1.3 The CR may only initiate RFCs on those components of the


information system for which they are qualified and authorized
to access for purposes of initiating such changes, including
upgrades and modifications.

Page 7 of 23
Change Management Policy and Procedures

9.1.2 Types of RFCs

9.1.2.1 There are four types of RFCs (described in Table 1):


Table 1 Types of RFCs

CHANGE DESCRIPTION
TYPE
A Standard Change is created from preapproved Standard change templates
Standard that have satisfied specific criteria (see Appendix A) and been added to the
Change Standard Change Template Catalog in Footprints: the change is repeatable,
frequently implemented, is considered low risk and low impact according to
the SIA, and has a proven history of success (completed the Normal change
lifecycle process at least 3-5 times with no issues). Standard changes that are
approved by Division Directors and CAB Co-Chairs are added to the catalog
and considered pre-authorized, following a shorter ChM lifecycle outside of
the CAB approval process (subject to dual authorization). CRs can request
new Standard change templates or use an existing template from the catalog
to create a new Standard change request.
A Normal Change is one that meets the defined lead time for testing and
Normal validation and is assigned a SIA level of no, low, medium, or high. A Normal
Change change is an RFC that is not a Standard, Expedited or Emergency change, and
is subject to the full ChM review process, including review and authorization
by the CAB.
An Expedited Change does not meet the lead time requirement for a Normal
Expedited change, but is not an Emergency Change. Service is at risk, although service
Change might not be down, and the RFC needs to be authorized because of a client
request that has been validated by SME/ technical expert or a Director, who
has determined that that the change needs to go in without waiting for the
recommended lead-time. The same ‘Normal’ Change request information is
provided in Footprints to implement the change, including the reason for
expediting the RFC (SIA, back-out plans, scheduled time and downtime
required), but lead times are much shorter. Authorization by a CAB Co-Chair
is required and Expedited Changes are subject to retroactive review by CAB.
Emergency Change is one that must be implemented as soon as possible to
Emergency correct, or prevent, a high priority incident, or that must be introduced as
Change soon as possible due to likely negative service impacts or situations where
the impact to a service is imminent if action is not taken. These changes do
not follow the complete lifecycle of a Normal change due to the speed with
which they must be implemented and authorized. All emergency changes are
authorized by E-CAB and documented and entered into Footprints prior to
implementation, or as soon as possible after the change has been
implemented depending on the nature of the emergency. Emergency changes
are subject to a Post Implementation Review (PIR) process by CAB.

Page 8 of 23
Change Management Policy and Procedures

9.1.3 Standard RFCs:

9.1.3.1.1 CRs can either: choose from an existing Standard


Change template in the Footprints catalog; or propose a
new template for a Standard Change (see process
described in Appendix B).

9.1.3.1.2 To create a new Standard Change RFC from an existing


template, select the appropriate match from the list of
approved Standard Changes listed in the Standard
Change Catalog in Footprints.

9.1.3.1.3 Once the type of Standard Change is selected, the CR’s


Division Director, or Director’s Designee, must sign off
on the designation of the RFC as a Standard Change in
Footprints to provide verification that the RFC is a
match and properly categorized Standard Change.

9.1.3.1.4 Once a Standard Change RFC has been selected within


Footprints, and signed off on by the Division Director, it
is considered pre-authorized and will be automatically
included on a Standard Change Dashboard for CAB
members to view on a rolling basis.

9.1.3.1.5 If an objection to the Standard Change is raised with the


CAB Facilitator and/or CAB Co-Chairs, the Standard
Change will be removed from the preauthorized list and
added to the CAB agenda for discussion and approval at
CAB.

9.1.3.1.6 If no objection is raised, the Standard Change is


reviewed to be correct and authorized by the CAB
Facilitator in advance of the CAB meeting.

9.1.3.1.7 The CAB Facilitator authorizes Standard Changes on a


biweekly basis.

9.1.3.1.8 All Standard Changes are tracked in Footprints and


must follow implementation and validation procedures
identified below (section 9.4).

9.1.4 Normal Change RFCs:

9.1.4.1 Unless the RFC is assigned to another assigned to individual (see


Change Owner), the CR is the owner of the RFC from creation to
closure.

Page 9 of 23
Change Management Policy and Procedures

9.1.4.2 The CR inputs all of the required Normal Change Request


information in Footprints (for Required Information, see
Appendix D). The CR enters the business needs, goals and
objectives of the change and ensures they are accurate, and
provides all supporting documentation for the change (i.e. install,
test and back-out plans).

9.1.4.3 The CR completes the SIA and consults with the Information
Team for those RFCs with an impact level of moderate or high. In
some cases, the CR will still need to discuss an RFC even though it
has an impact level of low. Please send an email to the IT
Security Team group (security.infrastructure@maine.gov).

9.1.4.4 The CR provides CAB representation when necessary.

9.1.4.5 CAB approval is required before implementation.

9.1.5 Expedited Change RFCs:

9.1.5.1 The CR follows same process and approval flow as a Normal


Change RFC, but lead times are shorter. Expedited Change RFCs
must demonstrate that service is at risk, although service might
not be down, and the RFC needs to be authorized because of a
client request that has been validated by SME/ technical expert
or a Director, who has determined that that the change needs to
go in without waiting for the recommended lead-time.

9.1.5.2 The same Normal Change request information is provided in


Footprints to implement the change, including the reason for
expediting the RFC (SIA, back-out plans, scheduled time and
downtime required).

9.1.5.3 It is the responsibility of the CR or CO to shepherd the Expedited


change through the approval process.

9.1.5.4 All Expedited RFCs must be preauthorized by the CAB Co-Chairs.


Retroactive CAB approval is required.

9.1.6 Emergency Change RFCs(E-RFCs):

9.1.6.1 E-RFCs do not follow the complete lifecycle of a Normal change


due to the speed with which they must be implemented. E-RFCs
must meet the criteria that they are necessary to correct, or
prevent a high priority incident, or likely negative service
impacts/situations where the impact to a service is imminent if
action is not taken.

Page 10 of 23
Change Management Policy and Procedures

9.1.6.2 All E-RFCs are authorized by E-CAB and documented and entered
into Footprints prior to implementation, or as soon as possible
after the change has been implemented depending on the nature
of the emergency.

9.1.6.3 The E-RFC is discussed at the earliest CAB meeting and are
subject to a Post Implementation Review (PIR).

9.1.7 Notice Requirement:

9.1.7.1 All Normal Change RFCs require a minimum two-week notice to


impacted stakeholders, unless the stakeholders have agreed to
waive this requirement.

9.1.8 Deadline for CAB; Lead time:

9.1.8.1 All Normal RFCs must be submitted via Footprints and be fully
complete no later than noontime on Wednesday for
consideration at the CAB meeting to be reviewed by the CAB that
week, subject to the following lead times:

9.1.8.1.1 Any Normal RFCs with an SIA impact level of No to Low


must provide at least one week of advanced notice to
CAB, depending on the urgency of the RFC.

9.1.8.1.2 Any Normal RFCs with an SIA impact level of Moderate


to High must provide at least 3 weeks advanced notice
to the CAB, with the amount of lead time dependent
upon the complexity of the RFC.

9.2 CAB Agenda- Prioritized Based on RFC Type (Preparation for CAB):

9.2.1 The CAB Facilitator prepares the weekly CAB agenda for distribution to
CAB members, including all RFCs that are open and complete and have
met the RFC CAB submission and lead time requirements;

9.2.2 The CAB facilitator prioritizes RFCs on the CAB agenda based on the
RFC’s SIA impact level (no, low, moderate, high) as listed in Footprints.
Any emergency RFCs that were authorized by the E-CAB during the
previous week, as well as any unsuccessful or failed RFCs, are added to
the agenda for PIR.

9.2.3 The CAB Facilitator communicates with the CAB Co-Chairs, Chief
Information Security Officer and information security team
representatives to review any RFCs with a SIA impact level of High to
review the timeline and implementation steps necessary prior to CAB.

Page 11 of 23
Change Management Policy and Procedures

9.3 Assessment and Evaluation of the RFC (in CAB):

9.3.1 During CAB, the CAB Facilitator adds his/her name to the RFC
documentation in the change record (for all RFCs during their leadership
term).

9.3.2 The CAB meeting is conducted in accordance with the CAB agenda.

9.3.1 CAB members:

9.3.1.1 Advise on the assessment, prioritization and scheduling of RFCs,


authorizing their release.

9.3.1.2 Ensure the CR has adhered to OIT policy and RFCs are
sufficiently tested and evaluated to determine the impact to
system security before implementation to ensure the lowest
possible risk to services.

9.3.1.3 Use the SIA as the framework for the evaluation of the RFC,
which allows for the assessment of the potential impact of
changes to the information system in a repeatable manner that
ensures balances security, business and technical viewpoints.

9.3.1.4 Determine by consensus to authorize, defer or reject the RFC.

9.3.1.5 Perform any necessary PIRs on expedited or emergency RFCs


authorized during the previous week, as well as any unsuccessful
or failed RFCs.

9.3.2 Unapproved changes to OIT managed information systems are


prohibited.

9.4 Implementation and Validation of the RFC (Post-CAB):

9.4.1 The CR (or CO) implements the RFC and verifies that approved changes
are implemented correctly, operating as intended, and meeting security
requirements.

9.4.2 The CR includes changes to applicable/related configuration parameters


as well as updates system documentation to reflect the changes.

9.4.3 For successful RFCs:

9.4.3.1 The CR confirms the change was deployed without issues and
closes out the change request.

9.4.4 For failed RFCs:

Page 12 of 23
Change Management Policy and Procedures

9.4.4.1 In the event the RFC is unsuccessful, fails, or is partially


implemented and cannot be completed, the change may need to
be backed out. In this case, the approved Backout Plan is
implemented.

9.4.4.2 A PIR is conducted at the direction of the CAB Co-Chairs to


determine how the change was handled throughout its lifecycle
and identify opportunities to improve implementation of similar
RFCs in the future.

9.4.5 The CAB audits and reviews activities related to changes to the
information system at least biannually.

10.0 Document History and Distribution:


Version Revision Log Date
Version 1.0 Initial Publication July 18, 2019

Approved by: Chief Information Officer

Legal Citation: Title 5, Chapter 163: Office of Information Technology4.

Distribution

This document will be distributed to all appropriate State of Maine personnel and
will be posted on the OIT website (https://www.maine.gov/oit/policies-standards).

11.0 Document Review:

This document is to be reviewed annually and when substantive changes are made
to policies, procedures or other authoritative regulations affecting this document.

12.0 Records Management:

State of Maine security policies, plans, and procedures will be retained and then
destroyed in accordance with the Maine State Archivist Records Management
General Schedule5.

13.0 Public Records Exceptions:

Under the Maine Freedom of Access Act, certain public record exceptions may limit
disclosure of agency records related to information technology infrastructure and

4 http://legislature.maine.gov/statutes/5/title5ch163sec0.html
5 http://www.maine.gov/sos/arc/records/state/generalschedules.html

Page 13 of 23
Change Management Policy and Procedures

systems, as well as security plans, procedures or risk assessments. Information


contained in these records may be disclosed to the Legislature or, in the case of a
political or administrative subdivision, to municipal officials or board members
under conditions that protect the information from further disclosure. Any
aggrieved person seeking relief for an alleged violation of the FOAA may bring suit
in any Superior Court in the state.

14.0 Definitions:

14.1 Backout Plan: A plan that is used in the event a change moved into
production causes unwanted results and the system must be returned to a
previous functional version to restore business operations.

14.2 Change Advisory Board (CAB): The CAB is comprised of representatives from
all areas of OIT, who are considered standing, regular members of the CAB, as
well as other individuals who may participate on an ad hoc basis, depending on
the nature of the RFC being reviewed: CAB Co-Chairs; CAB Leaders; User
managers and groups; Applications representatives; Information security
representative; and Technical experts.

14.3 Change Requestor (CR): The CR is the individual that creates the RFC in
Footprints. Unless the CR assigns the RFC to a different “assigned to” individual
(see Change Owner), the CR owns the change request from creation to closure.
The CR must complete all the required information in Footprints for Normal
RFCs (Appendix D).

14.4 Change management (ChM): The process that controls the life cycle of all
changes to the infrastructure or any aspect of services in a controlled manner,
enabling beneficial changes to be made with minimum disruption to IT services.
It applies to any change that might affect OIT systems, infrastructure and services
in the IT environment, including changes to all architectures, applications,
software, tools and documentation.

14.5 Change Owner (CO): For any RFC assigned, this role is deemed the owner of
the RFC from creation to closure. The CO is assigned to this role by the CR and is
responsible for owning the change request from creation to closure.

14.6 Change request (RFC): A formal request for change to any component of an
IT infrastructure or to any aspect of an IT service which is made to the OIT
production environment. The formal change request is logged in OIT’s
Footprints system, which includes all the information required in Appendix D.

14.7 E-CAB: A group dynamically convened at the call of the CAB Co-Chairs, on an
ad hoc basis, to prevent service interruption or restore service during an outage,
as the nature of the emergency requires. Individuals that may be called to serve
on the E-CAB include subject matter experts, information security

Page 14 of 23
Change Management Policy and Procedures

representatives, team leaders and others within OIT with relevant ChM
expertise.

14.8 Emergency change: A request for Change that must be implemented as soon
as possible to correct, or prevent, a high priority incident, or that must be
introduced as soon as possible due to likely negative service impacts.

14.9 Exempt change: Certain changes that are not included under ChM policy, as
identified by the CAB Co-Chairs, including: database content updates,
creating/removing/updating accounts, and creation or deletion of user files are
examples of exempt changes.

14.10 Standard Change Catalog: The collection of pre-approved Standard Changes


that have been authorized by the CAB Co-Chairs and are subject to a streamlined
ChM process outside of CAB.

14.11 Standard Change Template: An approved form for submission of requests for
routinely and frequently performed, low impact/risk RFCs determined to be
Standard Changes by the CAB Co-Chairs and subject to a streamlined process
outside of the CAB.

14.12 Security Impact Analysis (SIA): The SIA is based on three security categories
for both information and information systems based on methods described in
Federal Information Processing Standards (FIPS)Publication 199, “Standards for
Security Categorization of Federal Information and Information Systems” and
NIST Special Publication 800-53, “Security and Privacy Controls for Federal
Information Systems and Organizations.” The categories are based on the
potential impact on an agency should certain events occur that jeopardize the
information/information systems necessary to accomplish its mission, protect
its assets, fulfill its legal responsibilities, maintain its day-to-day functions and
protect individuals. The SIA is conducted to determine the extent to which
changes to the information system will affect the security state of the system.

Page 15 of 23
Appendix A - Standard Change Classification Template

STANDARD CHANGE CLASSIFICATION TEMPLATE

Name of Proposed Standard Change Classification (Type): Date Requested:


Requested by (Section Manager and above): Reviewed by (Division Director or Director’s Designee):

QUESTIONS RESPONSE

Provide a brief description of the change and identify why it should


be categorized as a Standard Change for inclusion in the Standard
change catalog.

Does this type of change satisfy the criteria for Standard Changes YES _______ NO _______
identified in the Checklist?

How frequently is this type of change made?

Are there documented procedures describing the steps necessary to YES _______ NO _______
complete the change?

Is there a viable back-out procedure that can be documented in the YES _______ NO _______
RFC?

Is the change considered low risk/ impact to the OIT production YES _______ NO _______
environment, security, services, infrastructure, customers/users, and
business processes?

Has this type of change ever failed before? If so, what happened?
Did you have to back it out?

Approved YES _______ NO _______ CAB Co-Chairs’ Signatures: __________________________ / _______________________________

Page 16 of 23
Appendix A - Standard Change Classification Template

Date of decision: ______________________

STANDARD CHANGE CHECKLIST

A Standard Change is considered a subset of Normal Change RFCs (low risk, low impact) that also:

1. Has a proven history of success and predictable outcomes;

2. Is scriptable (step by step work procedures), frequently implemented and subject to successfully
repeatable implementation steps;

3. Has been proven to be a low-risk and low-impact change to the OIT production environment,
security, services, infrastructure, customers/users, and business processes;

4. Has documented build procedures;

5. Install plan (time to install, steps required) is documented;

6. Applicable customer, user, and internal notifications/communications are built into the workflow;

7. Procedural documentation for execution of each Standard Change request is maintained; and

8. Back-out or Recover procedure is documented and tested.

Page 17 of 23
Appendix B- Standard Change Classification Process and Checklist

Maine Office of Information Technology


Standard Change Classification Process and Checklist
This document establishes the process and checklist for classification of Standard changes to be
used in accordance with the standards set forth in the Change Management Policy and
Procedures document.
STANDARD CHANGE CLASSIFICATION PROCESS

1.0 STANDARD CHANGE CLASSIFICATION PROCESS


This document describes the process for classifying changes that qualify as Standard
changes within the change management process.
1.1 A Standard change is defined as a repeatable change that has been pre-authorized by
the CAB Co-Chairs by means of a documented procedure that controls risk and has
predictable outcomes. Standard changes are considered pre-approved and follow a
shorter lifecycle omitting the CAB authorization steps.
1.1.1 Any request to have an RFC classified and preauthorized as a Standard
change template must be submitted through using the OIT Standard
Change Classification Template (Appendix A), and approved by the
respective Division Director6. All requests must be finally approved by
the CAB Co-Chairs.
1.1.2 All submissions must meet the Checklist requirements in section 2 to the
satisfaction and approval of the CAB Co-Chairs.
1.1.3 Once a change is pre-authorized as a Standard Change by the CAB Co-
chairs, they are stored in a catalog of templates. Change requestors will be
able to select from the existing Standard change catalog the appropriate
option that matches their standard change RFC. The selection must be
signed off on by a separate individual, the Division Director or Director’s
designee, and that individual is listed in Footprints.
1.1.4 All Standard change RFCs are tracked in Footprints and controlled by a
pre-approved standardized process that occurs outside of the CAB.
2.0 STANDARD CHANGE: CLASSIFICATION CHECKLIST
2.1 The following checklist must be used for submission of any RFC for classification as
a Standard change template by the CAB Co-Chairs and entrance into the Standard
change catalog.
2.1.1 The change is a subset of a Normal RFC (low risk, low impact) that is:
2.1.1.1 Frequently implemented;
2.1.1.2 Subject to successfully repeatable implementation steps and

6
Individuals authorized to submit requests to the CAB Co-Chairs for classification of Standard changes
include: Division Directors, or the Division Director’s designee (typically the Deputy Division Directors). The
completion of the Standard Change List Submission Template (Appendix B) may only be completed by
Section Managers and above. To ensure separation of duties, the Submission Template must be reviewed by a
different individual than the one who requested the submission.

Page 18 of 23
Appendix B- Standard Change Classification Process and Checklist

standard documented procedure;


2.1.1.3 Has a proven history of success and predictable outcomes;
2.1.1.4 Is considered a low-risk and low-impact change to the OIT
production environment, security, services, infrastructure,
customers/users, and business processes; and
2.1.1.5 Notification of impacted parties is built into the workflow.

3.0 STANDARD CHANGE CATALOG LIST; ANNUAL REVIEW


3.1 Standard change catalog; annual review
3.1.1 The standard change catalog must be reviewed annually, or earlier if
required, by the CAB Co-Chairs to ensure they remain valid.

Page 19 of 23
Appendix C – Security Impact Analysis

Maine Office of Information Technology


Security Impact Analysis
This document establishes the Security Impact Analysis to be used in accordance with the standards set
forth in the Change Management Policy and Procedures document.

SECURITY IMPACT ANALYSIS (SIA)


Table 2:Security Impact Analysis
POTENTIAL IMPACT

Security Objective NO LOW MODERATE HIGH

Confidentiality No The unauthorized The unauthorized The unauthorized


Preserving authorized adverse disclosure of disclosure of disclosure of information
restrictions on affect information could information could could be expected to have
information access be expected to be expected to a severe or catastrophic
and disclosure, have a limited have a serious adverse effect on
including means for adverse effect on adverse effect on organizational operations,
protecting personal organizational organizational organizational assets, or
privacy and operations, operations, individuals.
proprietary organizational organizational
information. assets, or assets, or
[44 U.S.C., SEC. 3542] individuals. individuals.

Integrity No The unauthorized The unauthorized The unauthorized


Guarding against adverse modification or modification or modification or
improper affect. destruction of destruction of destruction of
information information could information could information could be
modification be expected to be expected to expected to have a severe
or destruction, and have a limited have a serious or catastrophic adverse
includes ensuring adverse effect on adverse effect on effect on organizational
information non- organizational organizational operations, organizational
repudiation and operations, operations, assets, or individuals.
authenticity. organizational organizational
[44 U.S.C., SEC. 3542] assets, or assets, or
individuals. individuals.

Availability No The disruption of The disruption of The disruption of access


Ensuring timely and adverse access to or use of access to or use of to or use of information or
reliable access to and affect. information or an information or an an information system
use of information. information system information system could be expected to have
[44 U.S.C., SEC. 3542] could be expected could be expected a severe or catastrophic
to have a limited to have a serious adverse effect on
adverse effect on adverse effect on organizational operations,
organizational organizational organizational assets, or
operations, operations, individuals.
organizational organizational
assets, or assets, or
individuals. individuals.

Page 20 of 23
Appendix C – Security Impact Analysis

The SIA establishes security categories for information systems described in FIPS Publication 1997. It
provides the framework for determining an appropriate set of security controls within the ChM process
required to protect information and information systems. The security categories are based on the
potential impact on an agency should certain events occur which jeopardize the information and
information systems needed by OIT to accomplish its mission, protect its assets, fulfill its legal
responsibilities, maintain its day-to-day functions, and protect individuals. Security categories are to be
used in conjunction with vulnerability and threat information in assessing the risk to an agency. System
information must be protected at a level commensurate with the most critical or sensitive user
information being processed by the system to ensure confidentiality, integrity and availability.

The application of the SIA must take place within the context of OIT’s organization and the overall
State interest and are provided as guidance ONLY:

The potential impact is NO Impact if —

− When the unauthorized disclosure of information, the unauthorized modification or destruction of


information, or the disruption of access to or use of information or an information system could be
expected to have a very limited or no adverse effect on organizational operations, organizational assets,
or individuals that may, for example (i) little or no degradation in mission capability or effectiveness; (ii)
result in little or no damage to organizational assets; (iii) result in very minor or no financial loss; or (iv)
result in no harm to individuals greater than the potential for inconvenience caused by, for example,
missing or misrepresented information.
Applying the Standard: For example, NO impact systems may not store, communicate, or process any
Privacy Act or confidential information.

The potential impact is LOW if—

− The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect
on organizational operations, organizational assets, or individuals.

Clarification: A limited adverse effect means that, for example, the loss of confidentiality, integrity, or
availability might: (i) cause a degradation in mission capability to an extent and duration that the
organization is able to perform its primary functions, but the effectiveness of the functions is noticeably
reduced; (ii) result in minor damage to organizational assets; (iii) result in minor financial loss; or (iv)
result in minor harm to individuals.
Applying the Standard: For example, LOW impact systems store data that is open to public inspection
or readily available through public sources. LOW impact systems may not store, communicate, or process
any Privacy Act or confidential information.

The potential impact is MODERATE if—

− The loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect
on organizational operations, organizational assets, or individuals.

Clarification: A serious adverse effect means that, for example, the loss of confidentiality, integrity, or
availability might: (i) cause a significant degradation in mission capability to an extent and duration that
the agency is able to perform its primary functions, but the effectiveness of the functions is significantly
reduced; (ii) result in significant damage to agency assets; (iii) result in significant financial loss; or (iv)

7
(http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf)

Page 21 of 23
Appendix C – Security Impact Analysis

result in significant harm to individuals that does not involve loss of life or serious life threatening
injuries.

Applying the Standard: Is the information system affected primarily and routinely used to store,
communicate, or process any of the following types of information: Collections & Receivables;
Contingency Planning; Continuity of Operations; Cost Accounting/Performance Measurement; Energy
Resource Management; Energy Supply; Environmental Remediation; Information Management;
Information Security; Lifecycle/Change Management; Payments; Percentage Infrastructure Maintenance;
Reporting Information; Research & Development; Scientific & Technical Research & Innovation; Security
Management; System & Network Monitoring; System Development; System Maintenance.

• Does aggregation of information on this system reveal sensitive patterns and plans, or facilitate access
to sensitive or critical systems?
• Would unauthorized modification or destruction of information affecting external communications (e.g.,
web pages, electronic mail) adversely affect operations or seriously damage mission function and/or
public confidence?
• Would either physical or logical destruction of the system result in very large expenditures to restore the
system and/or require a long period of time for recovery?
• Does the mission served by the system, or the information that the system processes, affect the security of
critical infrastructures and key resources?
• Does the system store, communicate, or process any privacy act information or information protected
under state or federal law (such as: Personally Identifiable Information, Personal Health Information,
Federal or State tax information, Criminal Justice Information from the FBI, PCI data, information from
the Social Security Administration, Centers for Medicare and Medicaid Services)?
• Does the system store, communicate, or process any trade secrets information?
• Are there any other extenuating circumstances that may require the SIA to be elevated to the next
higher level (such as but not limited to: system provides critical process flow or security capability,
public visibility of the system, the sheer number of other systems reliant on its operation, or the overall
cost of system replacement)?

If YES, then potential impact is MODERATE. If NO, then potential impact is LOW.

The potential impact is HIGH if—

− The loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic
adverse effect on agency operations, organizational assets, or individuals.

Clarification: A severe or catastrophic adverse effect means that, for example, the loss of confidentiality,
integrity, or availability might: (i) cause a severe degradation in or loss of mission capability to an extent
and duration that the agency is not able to perform one or more of its primary functions; (ii) result in
major damage to agency assets; (iii) result in major financial loss; or (iv) result in severe or catastrophic
harm to individuals involving loss of life or serious life threatening injuries.

Applying the standard: Is the information system affected primarily and routinely used to store,
communicate, or process any of the following types of information: Emergency Response; or Key Asset &
Critical Infrastructure Protection, or confidential information that has the potential to cause great harm
or damage to individuals or institutions if breached or disclosed to unauthorized users?

If YES, then potential impact is HIGH.

Page 22 of 23
Appendix D – Normal Change RFCS: Required Information in Footprints

Normal Change RFCs: Required Information in Footprints


NORMAL CHANGE REQUIRED INFORMATION
REQUEST

• Select the appropriate change type from the dropdown list.

• Indicate the business need and justification for the change.

• Indicate the technical validity of change.

• Complete the Security Impact Analysis (Appendix C).

• Indicate if communication has been made to impacted stakeholders regarding the goals and
objectives of the RFC.

• Perform a conflict check and indicate its completion (determine if the change is proposed to
be scheduled at the same time as other changes; determine possible impacts of any
scheduling conflicts on all affected stakeholders). This may include consulting the ChM
Calendar and any applicable change windows for planning the implementation dates.

• Ensure that the RFC does not interfere with the achievement of service level commitments
to agency partners and customers.

• Indicate the appropriate lead time notice has been provided to all impacted stakeholders,
unless the impacted agencies agree to waive this requirement.

• Indicate when approval of the implementation dates has been received from all impacted
stakeholders.

• Identify if additional assistance from Account Managers, as well as the Application


Development staff, has been leveraged, when necessary, to assist with Agency notification -
(CR/CO retains ultimate responsibility for obtaining and coordinating the approval of the
RFC from all stakeholders).

• Identify if any cross-functional (departmental/agency) issues are resolved/unresolved.

• Indicate if Infrastructure Team resources are required for implementation of the change and
if they have been contacted.

• Properly complete all required RFC information in Footprints in a timely manner.

Page 23 of 23

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy