State of Maine Department of Administrative & Financial Services Office of Information Technology
State of Maine Department of Administrative & Financial Services Office of Information Technology
Table of Contents
Page 2 of 23
Change Management Policy and Procedures
This policy addresses industry standards and best practices as defined by the
National Institute of Standards and Technology (NIST) Special Publication 800-53
(configuration management family of controls), Federal Information Processing
Standards (FIPS) and Special Publications (SP), which stress the importance of
ensuring that information systems document and assess the potential impact that
proposed system changes have on the operational processes and security posture of
the overall system.
3.0 Scope:
This policy applies to all State of Maine employees and contractors (collectively
referred to as personnel in this document) with access to:
3.2 Information assets from other State government branches that use the State
network.
If this policy conflicts with any law or union contract in effect, the terms of the
existing law or contract prevail.
Page 3 of 23
Change Management Policy and Procedures
5.2.1 Appointing two individuals, one member and one alternate, from each
division with expertise in their respective technology areas to serve on
the Change Advisory Board (CAB).
5.3.1 Ensuring the CAB adheres to ChM procedures and is robustly staffed with
sufficient IT and stakeholder representatives;
5.3.2 Determining the schedule for CAB members to serve as CAB Facilitators
on a rotating basis;
5.3.5 Selecting E-CAB members to serve on an ad hoc basis on the E-CAB, as the
nature of the emergency requires;
1
The CAB Co-Chairs are responsible for the actions taken by a designee on their behalf within the
scope of this policy.
Page 4 of 23
Change Management Policy and Procedures
5.4.4 Overseeing how proposed changes could affect the functionality and
secure state of the information system based upon the CI’s assessment;
and
5.4.5 Providing support for the Major Incident Procedure plan2, when
applicable, as directed by the CAB Co-Chairs, if the back-out plan fails.
5.5.2 Preparing the CAB meeting agenda for distribution to CAB members,
including all Open RFCs that are complete and have met the CAB
submission deadline;
5.5.3 Prioritizing open RFCs on the agenda for the CAB meeting based on the
security impact level identified from the Security Impact Analysis3
(Appendix C);
5.6 The CAB Emergency Committee (E-CAB) members are responsible for:
2
https://www.maine.gov/oit/sites/maine.gov.oit/files/inline-files/major-incident-procedure.pdf
3 Security Impact Analysis satisfies the NIST configuration management family of controls (CM-4).
Page 5 of 23
Change Management Policy and Procedures
5.7.1.2 Providing all of the details that must be included in the RFC (see
Appendix D); and
5.7.1.3 If necessary, assigning the RFC to a Change Owner (CO) in
Footprints who is better equipped to manage the requirements
of the RFC and takes over responsibility for the RFC from
implementation to validation post-CAB.
5.7.2 Attending CAB as necessary to assist the CAB with deliberation on the
RFC; and
5.8.1.1 Completing all the required information for the RFC in Footprints
necessary to meet the CAB submission deadline (see Appendix
D);
The State of Maine is committed to following this policy and the procedures that
support it.
The State of Maine recognizes the critical need for contingency planning that meet
our unique requirements and relate directly to our mission, size, structure, and
functions. We further recognize that effective change management meets and
surpasses the service expectation and business needs of OIT’s customers and
Page 6 of 23
Change Management Policy and Procedures
8.0 Compliance:
For State of Maine employees, failure to comply with the procedures identified in
this plan may result in progressive discipline up to and including dismissal. For non-
State of Maine employees and contractors, failure to comply may result in removal
of the individual’s ability to access and use State of Maine data and systems.
Employers of non-State of Maine employees will be notified of any violations.
9.0 Procedures:
The following change management procedures apply to all changes to the IT
infrastructure and production environment, excluding exempt changes, to ensure
the appropriate steps occur prior to the implementation of change request.
Page 7 of 23
Change Management Policy and Procedures
CHANGE DESCRIPTION
TYPE
A Standard Change is created from preapproved Standard change templates
Standard that have satisfied specific criteria (see Appendix A) and been added to the
Change Standard Change Template Catalog in Footprints: the change is repeatable,
frequently implemented, is considered low risk and low impact according to
the SIA, and has a proven history of success (completed the Normal change
lifecycle process at least 3-5 times with no issues). Standard changes that are
approved by Division Directors and CAB Co-Chairs are added to the catalog
and considered pre-authorized, following a shorter ChM lifecycle outside of
the CAB approval process (subject to dual authorization). CRs can request
new Standard change templates or use an existing template from the catalog
to create a new Standard change request.
A Normal Change is one that meets the defined lead time for testing and
Normal validation and is assigned a SIA level of no, low, medium, or high. A Normal
Change change is an RFC that is not a Standard, Expedited or Emergency change, and
is subject to the full ChM review process, including review and authorization
by the CAB.
An Expedited Change does not meet the lead time requirement for a Normal
Expedited change, but is not an Emergency Change. Service is at risk, although service
Change might not be down, and the RFC needs to be authorized because of a client
request that has been validated by SME/ technical expert or a Director, who
has determined that that the change needs to go in without waiting for the
recommended lead-time. The same ‘Normal’ Change request information is
provided in Footprints to implement the change, including the reason for
expediting the RFC (SIA, back-out plans, scheduled time and downtime
required), but lead times are much shorter. Authorization by a CAB Co-Chair
is required and Expedited Changes are subject to retroactive review by CAB.
Emergency Change is one that must be implemented as soon as possible to
Emergency correct, or prevent, a high priority incident, or that must be introduced as
Change soon as possible due to likely negative service impacts or situations where
the impact to a service is imminent if action is not taken. These changes do
not follow the complete lifecycle of a Normal change due to the speed with
which they must be implemented and authorized. All emergency changes are
authorized by E-CAB and documented and entered into Footprints prior to
implementation, or as soon as possible after the change has been
implemented depending on the nature of the emergency. Emergency changes
are subject to a Post Implementation Review (PIR) process by CAB.
Page 8 of 23
Change Management Policy and Procedures
Page 9 of 23
Change Management Policy and Procedures
9.1.4.3 The CR completes the SIA and consults with the Information
Team for those RFCs with an impact level of moderate or high. In
some cases, the CR will still need to discuss an RFC even though it
has an impact level of low. Please send an email to the IT
Security Team group (security.infrastructure@maine.gov).
Page 10 of 23
Change Management Policy and Procedures
9.1.6.2 All E-RFCs are authorized by E-CAB and documented and entered
into Footprints prior to implementation, or as soon as possible
after the change has been implemented depending on the nature
of the emergency.
9.1.6.3 The E-RFC is discussed at the earliest CAB meeting and are
subject to a Post Implementation Review (PIR).
9.1.8.1 All Normal RFCs must be submitted via Footprints and be fully
complete no later than noontime on Wednesday for
consideration at the CAB meeting to be reviewed by the CAB that
week, subject to the following lead times:
9.2 CAB Agenda- Prioritized Based on RFC Type (Preparation for CAB):
9.2.1 The CAB Facilitator prepares the weekly CAB agenda for distribution to
CAB members, including all RFCs that are open and complete and have
met the RFC CAB submission and lead time requirements;
9.2.2 The CAB facilitator prioritizes RFCs on the CAB agenda based on the
RFC’s SIA impact level (no, low, moderate, high) as listed in Footprints.
Any emergency RFCs that were authorized by the E-CAB during the
previous week, as well as any unsuccessful or failed RFCs, are added to
the agenda for PIR.
9.2.3 The CAB Facilitator communicates with the CAB Co-Chairs, Chief
Information Security Officer and information security team
representatives to review any RFCs with a SIA impact level of High to
review the timeline and implementation steps necessary prior to CAB.
Page 11 of 23
Change Management Policy and Procedures
9.3.1 During CAB, the CAB Facilitator adds his/her name to the RFC
documentation in the change record (for all RFCs during their leadership
term).
9.3.2 The CAB meeting is conducted in accordance with the CAB agenda.
9.3.1.2 Ensure the CR has adhered to OIT policy and RFCs are
sufficiently tested and evaluated to determine the impact to
system security before implementation to ensure the lowest
possible risk to services.
9.3.1.3 Use the SIA as the framework for the evaluation of the RFC,
which allows for the assessment of the potential impact of
changes to the information system in a repeatable manner that
ensures balances security, business and technical viewpoints.
9.4.1 The CR (or CO) implements the RFC and verifies that approved changes
are implemented correctly, operating as intended, and meeting security
requirements.
9.4.3.1 The CR confirms the change was deployed without issues and
closes out the change request.
Page 12 of 23
Change Management Policy and Procedures
9.4.5 The CAB audits and reviews activities related to changes to the
information system at least biannually.
Distribution
This document will be distributed to all appropriate State of Maine personnel and
will be posted on the OIT website (https://www.maine.gov/oit/policies-standards).
This document is to be reviewed annually and when substantive changes are made
to policies, procedures or other authoritative regulations affecting this document.
State of Maine security policies, plans, and procedures will be retained and then
destroyed in accordance with the Maine State Archivist Records Management
General Schedule5.
Under the Maine Freedom of Access Act, certain public record exceptions may limit
disclosure of agency records related to information technology infrastructure and
4 http://legislature.maine.gov/statutes/5/title5ch163sec0.html
5 http://www.maine.gov/sos/arc/records/state/generalschedules.html
Page 13 of 23
Change Management Policy and Procedures
14.0 Definitions:
14.1 Backout Plan: A plan that is used in the event a change moved into
production causes unwanted results and the system must be returned to a
previous functional version to restore business operations.
14.2 Change Advisory Board (CAB): The CAB is comprised of representatives from
all areas of OIT, who are considered standing, regular members of the CAB, as
well as other individuals who may participate on an ad hoc basis, depending on
the nature of the RFC being reviewed: CAB Co-Chairs; CAB Leaders; User
managers and groups; Applications representatives; Information security
representative; and Technical experts.
14.3 Change Requestor (CR): The CR is the individual that creates the RFC in
Footprints. Unless the CR assigns the RFC to a different “assigned to” individual
(see Change Owner), the CR owns the change request from creation to closure.
The CR must complete all the required information in Footprints for Normal
RFCs (Appendix D).
14.4 Change management (ChM): The process that controls the life cycle of all
changes to the infrastructure or any aspect of services in a controlled manner,
enabling beneficial changes to be made with minimum disruption to IT services.
It applies to any change that might affect OIT systems, infrastructure and services
in the IT environment, including changes to all architectures, applications,
software, tools and documentation.
14.5 Change Owner (CO): For any RFC assigned, this role is deemed the owner of
the RFC from creation to closure. The CO is assigned to this role by the CR and is
responsible for owning the change request from creation to closure.
14.6 Change request (RFC): A formal request for change to any component of an
IT infrastructure or to any aspect of an IT service which is made to the OIT
production environment. The formal change request is logged in OIT’s
Footprints system, which includes all the information required in Appendix D.
14.7 E-CAB: A group dynamically convened at the call of the CAB Co-Chairs, on an
ad hoc basis, to prevent service interruption or restore service during an outage,
as the nature of the emergency requires. Individuals that may be called to serve
on the E-CAB include subject matter experts, information security
Page 14 of 23
Change Management Policy and Procedures
representatives, team leaders and others within OIT with relevant ChM
expertise.
14.8 Emergency change: A request for Change that must be implemented as soon
as possible to correct, or prevent, a high priority incident, or that must be
introduced as soon as possible due to likely negative service impacts.
14.9 Exempt change: Certain changes that are not included under ChM policy, as
identified by the CAB Co-Chairs, including: database content updates,
creating/removing/updating accounts, and creation or deletion of user files are
examples of exempt changes.
14.11 Standard Change Template: An approved form for submission of requests for
routinely and frequently performed, low impact/risk RFCs determined to be
Standard Changes by the CAB Co-Chairs and subject to a streamlined process
outside of the CAB.
14.12 Security Impact Analysis (SIA): The SIA is based on three security categories
for both information and information systems based on methods described in
Federal Information Processing Standards (FIPS)Publication 199, “Standards for
Security Categorization of Federal Information and Information Systems” and
NIST Special Publication 800-53, “Security and Privacy Controls for Federal
Information Systems and Organizations.” The categories are based on the
potential impact on an agency should certain events occur that jeopardize the
information/information systems necessary to accomplish its mission, protect
its assets, fulfill its legal responsibilities, maintain its day-to-day functions and
protect individuals. The SIA is conducted to determine the extent to which
changes to the information system will affect the security state of the system.
Page 15 of 23
Appendix A - Standard Change Classification Template
QUESTIONS RESPONSE
Does this type of change satisfy the criteria for Standard Changes YES _______ NO _______
identified in the Checklist?
Are there documented procedures describing the steps necessary to YES _______ NO _______
complete the change?
Is there a viable back-out procedure that can be documented in the YES _______ NO _______
RFC?
Is the change considered low risk/ impact to the OIT production YES _______ NO _______
environment, security, services, infrastructure, customers/users, and
business processes?
Has this type of change ever failed before? If so, what happened?
Did you have to back it out?
Page 16 of 23
Appendix A - Standard Change Classification Template
A Standard Change is considered a subset of Normal Change RFCs (low risk, low impact) that also:
2. Is scriptable (step by step work procedures), frequently implemented and subject to successfully
repeatable implementation steps;
3. Has been proven to be a low-risk and low-impact change to the OIT production environment,
security, services, infrastructure, customers/users, and business processes;
6. Applicable customer, user, and internal notifications/communications are built into the workflow;
7. Procedural documentation for execution of each Standard Change request is maintained; and
Page 17 of 23
Appendix B- Standard Change Classification Process and Checklist
6
Individuals authorized to submit requests to the CAB Co-Chairs for classification of Standard changes
include: Division Directors, or the Division Director’s designee (typically the Deputy Division Directors). The
completion of the Standard Change List Submission Template (Appendix B) may only be completed by
Section Managers and above. To ensure separation of duties, the Submission Template must be reviewed by a
different individual than the one who requested the submission.
Page 18 of 23
Appendix B- Standard Change Classification Process and Checklist
Page 19 of 23
Appendix C – Security Impact Analysis
Page 20 of 23
Appendix C – Security Impact Analysis
The SIA establishes security categories for information systems described in FIPS Publication 1997. It
provides the framework for determining an appropriate set of security controls within the ChM process
required to protect information and information systems. The security categories are based on the
potential impact on an agency should certain events occur which jeopardize the information and
information systems needed by OIT to accomplish its mission, protect its assets, fulfill its legal
responsibilities, maintain its day-to-day functions, and protect individuals. Security categories are to be
used in conjunction with vulnerability and threat information in assessing the risk to an agency. System
information must be protected at a level commensurate with the most critical or sensitive user
information being processed by the system to ensure confidentiality, integrity and availability.
The application of the SIA must take place within the context of OIT’s organization and the overall
State interest and are provided as guidance ONLY:
− The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect
on organizational operations, organizational assets, or individuals.
Clarification: A limited adverse effect means that, for example, the loss of confidentiality, integrity, or
availability might: (i) cause a degradation in mission capability to an extent and duration that the
organization is able to perform its primary functions, but the effectiveness of the functions is noticeably
reduced; (ii) result in minor damage to organizational assets; (iii) result in minor financial loss; or (iv)
result in minor harm to individuals.
Applying the Standard: For example, LOW impact systems store data that is open to public inspection
or readily available through public sources. LOW impact systems may not store, communicate, or process
any Privacy Act or confidential information.
− The loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect
on organizational operations, organizational assets, or individuals.
Clarification: A serious adverse effect means that, for example, the loss of confidentiality, integrity, or
availability might: (i) cause a significant degradation in mission capability to an extent and duration that
the agency is able to perform its primary functions, but the effectiveness of the functions is significantly
reduced; (ii) result in significant damage to agency assets; (iii) result in significant financial loss; or (iv)
7
(http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf)
Page 21 of 23
Appendix C – Security Impact Analysis
result in significant harm to individuals that does not involve loss of life or serious life threatening
injuries.
Applying the Standard: Is the information system affected primarily and routinely used to store,
communicate, or process any of the following types of information: Collections & Receivables;
Contingency Planning; Continuity of Operations; Cost Accounting/Performance Measurement; Energy
Resource Management; Energy Supply; Environmental Remediation; Information Management;
Information Security; Lifecycle/Change Management; Payments; Percentage Infrastructure Maintenance;
Reporting Information; Research & Development; Scientific & Technical Research & Innovation; Security
Management; System & Network Monitoring; System Development; System Maintenance.
• Does aggregation of information on this system reveal sensitive patterns and plans, or facilitate access
to sensitive or critical systems?
• Would unauthorized modification or destruction of information affecting external communications (e.g.,
web pages, electronic mail) adversely affect operations or seriously damage mission function and/or
public confidence?
• Would either physical or logical destruction of the system result in very large expenditures to restore the
system and/or require a long period of time for recovery?
• Does the mission served by the system, or the information that the system processes, affect the security of
critical infrastructures and key resources?
• Does the system store, communicate, or process any privacy act information or information protected
under state or federal law (such as: Personally Identifiable Information, Personal Health Information,
Federal or State tax information, Criminal Justice Information from the FBI, PCI data, information from
the Social Security Administration, Centers for Medicare and Medicaid Services)?
• Does the system store, communicate, or process any trade secrets information?
• Are there any other extenuating circumstances that may require the SIA to be elevated to the next
higher level (such as but not limited to: system provides critical process flow or security capability,
public visibility of the system, the sheer number of other systems reliant on its operation, or the overall
cost of system replacement)?
If YES, then potential impact is MODERATE. If NO, then potential impact is LOW.
− The loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic
adverse effect on agency operations, organizational assets, or individuals.
Clarification: A severe or catastrophic adverse effect means that, for example, the loss of confidentiality,
integrity, or availability might: (i) cause a severe degradation in or loss of mission capability to an extent
and duration that the agency is not able to perform one or more of its primary functions; (ii) result in
major damage to agency assets; (iii) result in major financial loss; or (iv) result in severe or catastrophic
harm to individuals involving loss of life or serious life threatening injuries.
Applying the standard: Is the information system affected primarily and routinely used to store,
communicate, or process any of the following types of information: Emergency Response; or Key Asset &
Critical Infrastructure Protection, or confidential information that has the potential to cause great harm
or damage to individuals or institutions if breached or disclosed to unauthorized users?
Page 22 of 23
Appendix D – Normal Change RFCS: Required Information in Footprints
• Indicate if communication has been made to impacted stakeholders regarding the goals and
objectives of the RFC.
• Perform a conflict check and indicate its completion (determine if the change is proposed to
be scheduled at the same time as other changes; determine possible impacts of any
scheduling conflicts on all affected stakeholders). This may include consulting the ChM
Calendar and any applicable change windows for planning the implementation dates.
• Ensure that the RFC does not interfere with the achievement of service level commitments
to agency partners and customers.
• Indicate the appropriate lead time notice has been provided to all impacted stakeholders,
unless the impacted agencies agree to waive this requirement.
• Indicate when approval of the implementation dates has been received from all impacted
stakeholders.
• Indicate if Infrastructure Team resources are required for implementation of the change and
if they have been contacted.
Page 23 of 23