<section title="6.3. Change Management"><subsection title="Objective"><paragraph
    title="6.3.1."


><![CDATA[<p>To ensure information security is an integral part of the change management process, it should be incorporated into the agency’s IT maintenance governance and management activities.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="6.3.2."


><![CDATA[<p>This section covers information on identifying and managing routine and urgent changes to systems.</p>]]></paragraph>
</block>
<block title="Identifying the need for change"><paragraph
    title="6.3.3."


><![CDATA[<p>The need for change can be identified in various ways, including:</p><ul>
<li>system users identifying problems or enhancements;</li>
<li>vendors notifying of upgrades to software or IT equipment;</li>
<li>vendors notifying of the end of life to software or IT equipment;</li>
<li>advances in technology in general;</li>
<li>implementing new systems that necessitate changes to existing systems;</li>
<li>identifying new tasks or functionality requiring updates or new systems;</li>
<li>organisational change;</li>
<li>business process or concept of operation change;</li>
<li>standards evolution;</li>
<li>government policy or Cabinet directives;</li>
<li>threat or vulnerability identification and notifications received or issued; and</li>
<li>other incidents or continuous improvement activities.</li>
</ul>]]></paragraph>
</block>
<block title="Types of system change"><paragraph
    title="6.3.4."


><![CDATA[<p>A proposed change to a system could involve:</p><ul>
<li>an upgrade to, or introduction of IT equipment;</li>
<li>an upgrade to, or introduction of software;</li>
<li>environment or infrastructure change; or</li>
<li>major changes to access controls.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="6.3.5."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 120.833%; height: 268.404px;">
<tbody>
<tr style="height: 23.0556px;">
<td style="width: 15.8228%; height: 23.0556px;"><strong>Reference</strong></td>
<td style="width: 22.6217%; height: 23.0556px;"><strong>Title</strong></td>
<td style="width: 61.5607%; height: 23.0556px;"><strong>Source</strong></td>
</tr>
<tr style="height: 122.681px;">
<td style="width: 15.8228%; height: 122.681px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 22.6217%; height: 122.681px;">
<p>GOV3, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 61.5607%; height: 122.681px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
<tr style="height: 122.667px;">
<td style="width: 15.8228%; height: 122.667px;">
<p><strong>PSR requirements sections</strong></p>
</td>
<td style="width: 22.6217%; height: 122.667px;">
<p>Self assessment &amp; reporting</p>
<p>Protective security measures</p>
</td>
<td style="width: 61.5607%; height: 122.667px;">
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a></p>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/about/compliance" target="_blank">Complying with the Protective Security Requirements | Protective Security Requirements</a><a href="https://www.protectivesecurity.govt.nz/guidance/security-governance/managing-business-continuity"></a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Change management"><paragraph
    title="6.3.6.R.01."

    tags="Governance,Change Management"


><![CDATA[<p>A considered and accountable process requires consultation with all stakeholders before any changes are implemented. In the case of changes that will affect the security or accreditation status of a system, the Accreditation Authority is a key stakeholder and will need to be consulted and grant approval for the proposed changes.</p>]]></paragraph>
<paragraph
    title="6.3.6.R.02."

    tags="Governance,Change Management"


><![CDATA[<p>Change management processes are most likely to be bypassed or ignored when an urgent change needs to be made to a system. In these cases it is essential that the agency’s change management process strongly enforces appropriate actions to be taken before and after an urgent change is implemented.</p>]]></paragraph>
<paragraph
    title="6.3.6.C.01."

    tags="Governance,Change Management"


    classification="Top Secret"
    compliance="Must"
    cid="1088"
><![CDATA[<p>Agencies MUST ensure that for routine and urgent changes:</p><ul>
<li>the change management process, as defined in the relevant information security documentation, is followed;</li>
<li>the proposed change is approved by the relevant authority;</li>
<li>any proposed change that could impact the security or accreditation status of a system is submitted to the Accreditation Authority for approval; and</li>
<li>all associated information security documentation is updated to reflect the change.</li>
</ul>]]></paragraph>
<paragraph
    title="6.3.6.C.02."

    tags="Governance,Change Management"


    classification="All Classifications"
    compliance="Should"
    cid="1089"
><![CDATA[<p>Agencies SHOULD ensure that for routine and urgent changes:</p><ul>
<li>the change management process, as defined in the relevant information security documentation, is followed;</li>
<li>the proposed change is approved by the relevant authority;</li>
<li>any proposed change that could impact the security of a system or accreditation status is submitted to the Accreditation Authority for approval; and</li>
<li>all associated information security documentation is updated to reflect the change.</li>
</ul>]]></paragraph>
</block>
<block title="Change management process"><paragraph
    title="6.3.7.R.01."

    tags="Governance,Change Management"


><![CDATA[<p>Uncontrolled changes pose risks to information systems as well as the potential to cause operational disruptions.  A change management process is fundamental to ensure a considered and accountable approach with appropriate approvals.  Furthermore, the change management process provides an opportunity for the security impact of the change to be considered and if necessary, reaccreditation processes initiated.</p>]]></paragraph>
<paragraph
    title="6.3.7.C.01."

    tags="Governance,Change Management"


    classification="Top Secret"
    compliance="Must"
    cid="1093"
><![CDATA[<p>An agency’s change management process MUST define appropriate actions to be followed before and after urgent changes are implemented.</p>]]></paragraph>
<paragraph
    title="6.3.7.C.02."

    tags="Governance,Change Management"


    classification="All Classifications"
    compliance="Should"
    cid="1094"
><![CDATA[<p>An agency’s change management process SHOULD define appropriate actions to be followed before and after urgent changes are implemented.</p>]]></paragraph>
<paragraph
    title="6.3.7.C.03."

    tags="Governance,Change Management"


    classification="All Classifications"
    compliance="Should"
    cid="1095"
><![CDATA[<p>Agencies SHOULD follow this change management process outline:</p><ul>
<li>produce a written change request;</li>
<li>submit the change request to all stakeholders for approval;</li>
<li>document the changes to be implemented;</li>
<li>test the approved changes;</li>
<li>notification to user of the change schedule and likely effect or outage;</li>
<li>implement the approved changes after successful testing;</li>
<li>update the relevant information security documentation including the SRMP, SSP and SOPs</li>
<li>notify and educate system users of the changes that have been implemented as close as possible to the time the change is applied; and</li>
<li>continually educate system users in regards to changes.</li>
</ul>]]></paragraph>
</block>
<block title="Changes impacting the security of a system"><paragraph
    title="6.3.8.R.01."

    tags="Governance,Change Management"


><![CDATA[<p>The accreditation of a system accepts residual security risk relating to the operation of that system. Changes may impact the overall security risk for the system. It is essential that the Accreditation Authority is consulted and accepts the changes and any changes to risk.</p>]]></paragraph>
<paragraph
    title="6.3.8.C.01."

    tags="Governance,Change Management"


    classification="All Classifications"
    compliance="Must"
    cid="1098"
><![CDATA[<p>When a configuration change impacts the security of a system and is subsequently assessed as having changed the overall security risk for the system, the agency MUST reaccredit the system.</p>]]></paragraph>
</block>
</subsection>
</section>
