S 2.422 Handling change requests

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Change Manager

The requests for patches and changes should be submitted and processed according to the specified procedure.

Submitting and recording requests for change

First, all requests for change must be recorded. For all required information to be present, it is recommendable to provide the applicants with a form (see template of a request for change from the Resources for IT-Grundschutz).

This application is also designed for coordinating the change (see also: S 2.427 Coordination of change requests). For example, if a change was requested in order to resolve an existing problem, the request should also contain a corresponding reference to the problem, usually a recording number in a database.

Not every request for change is handled as a normal change within the patch and change process. Some clearly described routine changes that are performed in a standardised manner and nevertheless refer to a change can be handled similarly to a service request. For example, a service request would include the process of resetting a password and, in relation to patch and change management, a change to the login banner of a service (the text the services uses to answer when a connection is established via the network interface).

Filtering and accepting requests for change

After a request for change has been recorded, it is checked by the Change Manager. In so doing, requests for change that cannot be performed, are unnecessary, or were received in duplicate are to be determined. Such requests should be rejected, stating the reason. This way, the applicants are provided with the option of reconsidering and reformulating the request for change.

Once a request for change has been accepted, the information is entered into a change dataset in order to perform the change. The dataset can be captured in a software tool, on paper, or even in a specifically created database. During the further procedure, the change dataset is complemented by the following information:

Classifying requests for change (priority and category)

Once a request for change has been accepted, it must be prioritised and categorised:

The classification consisting of priority and category defines the way the request for change is processed further and therefore describes the importance of the planned change.

Priorities are assigned to a change by the Change Manager and are divided into different priority levels, whereby the security management should be granted a power to veto a priority that is too low and/or an incorrect priority. For example, the following priority levels can be assigned by the Change Manager:

Categories are normally assigned by the Change Manager, whereby the security management team should also be provided with a power to veto a categorisation that is too low. Categories are intended to provide an assessment as to the effects of the change and the strain on the organisation caused by the change process. For example, the following categories may be assigned:

Planning

The employees involved in the patch and change management process plan the implementation for all accepted changes. If required, this is performed in cooperation with the CAB. At this point of the patch and change management process, it is important to take into consideration the required technical and personnel resources and to assess the effects on operations while the change is being performed. The following aspects should be considered at a minimum:

Review questions: