2 Change Management
2 Change Management
To ensure that the security, reliability and availability of Wilson James’s IT networks and
systems are maintained through controlled change so we can achieve the aim of our
Information Security Policy.
Purpose
Failure to comply with the requirements set out in this procedure may result in disciplinary
action being taken against you, or, in the case of third parties, might be seen as a breach of
contract.
This procedure addresses all changes to Wilson James’s IT networks and systems. This includes
changes to hardware, software (including patches and fixes), and associated documentation
(e.g. technical specifications, operational manuals, and user guides). Software changes include
changes to third party software packages and internally developed software and also addresses
Scope
changes to operational (live) data that are made outside of the software application that is
associated with the data, e.g. direct SQL changes.
This policy does not address the reporting and fixing of IT faults. However, an IT fault could lead
to a hardware or software change, in which case, this policy applies.
IMS-SOP-No.2 Record Control identifies record keeping requirements for all documents used
Record Keeping
within this procedure.
Continuous Please send any process improvement suggestions to the Process Owner who will evaluate and
Improvement implement accordingly.
Associated
ISO27001: 2013
Standards
Contents
Annual Review Record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Document Change Record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
CHANGE MANAGEMENT...........................................................................................................................................4
Types of IT Changes...............................................................................................................................................4
Raising Change Requests.......................................................................................................................................4
Feasibility and Impact Assessment of Change Requests........................................................................................4
Approval / Rejection of Change Requests..............................................................................................................5
Preparing for Operational Implementation of the Change....................................................................................5
Management Sign-off prior to Operational Change...............................................................................................6
Operational Implementation of the Change..........................................................................................................6
Change Request Closure........................................................................................................................................6
Retention of ‘Closed’ Change Requests.................................................................................................................6
CHANGE MANAGEMENT
Types of IT Changes
Within Wilson James, there are 3 types of IT changes – Routine, Standard and Emergency. The main differences
between the 3 are the timescales for their implementation and the process followed to grant Change approval.
Emergency Changes (ECR’s) usually result from a requirement to apply a fix to a system or service to restore
service or prevent an outage.
An Emergency change is subject to approval by at least one member of the management team but may be
implemented with the actual change record being retrospectively completed in the interests of restoring service.
Standard Changes to existing systems and infrastructure require at least a 5 day lead time and will be fully
approved before they are implemented.
Routine Changes will initially be approved via the same process as a Standard change, but subsequent iterations
of this change will be contained within the same record and therefore not need to be ‘re-approved’.
‘Emergency’ changes are subject to retrospective assessment, approval and documentation in compliance with
this change management policy.
Special Note:
It is possible that at any time, the Change Request may be cancelled or rejected by the Requestor or by an
authorised person, e.g. the Requestor’s line Manager, or rejected by the Change Advisory Board (CAB). In all
cases, relevant parties shall be kept informed. If a Change Request is cancelled or rejected, then Wilson James IT
shall ensure that the status of the Change Request is updated.
Classifying changes as Major or Minor will be based upon the Risk and Impact of the request. A Major change
would be classified as one that has a high risk in terms of potential user/service impact and is complex in its
nature. High impact would be a change where its failure would have significant effect on the service/users being
changed. A minor change is accordingly low risk/impact.
Wilson James IT shall ensure that a suitable Assessor(s) is appointed, and that the Change Request record is
completed. If necessary, further questions may be asked of the Requestor and the Manager who approved the
Change Request.
Once the assessment is completed, the Assessor shall ensure that the status of the Change Request within the
Change system is updated.
Any standard changes that could have an impact on the production environment will only be actioned within the
next maintenance window to reduce the perceived impact on the business. This may need an addition to the
original lead time as they will be applied in the next maintenance window after a period of a least 5 days.
IT Documentation Updates
All relevant IT documentation shall be updated by responsible parties to ensure that it is consistent with the
change. This includes, but is not limited to technical specifications, operational manuals, user guides, IT security
policy, procedures and guidelines, and business continuity plans and IT disaster recovery plans.
APPENDIX A
‘Routine’ change
A ‘Routine’ change is a change that is highly unlikely to lead to a significant security incident or significant
disruption to Wilson James’s services. It is a change that does not impact on current security policies, procedures
and controls.
‘Routine’ changes include:
1. Installation of minor ‘tried and tested’ software modules, such as patches and fixes
‘Emergency’ change
An ‘Emergency’ change is a change that needs to be implemented into operations as soon as practically possible.
This is because the change is justified from a business and / or security perspective, e.g. following identification of
a significant flaw in software functionality or an important IT vulnerability. These types of change shall be kept to
a minimum. ‘Emergency’ changes are often subject to retrospective assessment, approval and documentation in
compliance with this change management policy.