Security Change Management Procedure

Change management procedure for the Security Division.

Purpose

The purpose of this document is to outline the procedural change management steps as they relate to the Security Division.

Scope

This document applies to systems and applications owned by Security and processes owned by Security Departments.

Note: Changes related to user access and authorization should continue to be handled via the access request process.

Security has defined the following types of changes:

Minor change

A minor change is a non-material change which occurs through the natural course of business, such as handbook updates. Minor changes may be implemented directly in Production, have no financial impact, are related to general maintenance, and can be easily reversed.

A minor change does not require a change management issue and can be handled internally within the relevant team. Security’s least privilege access controls support the checks and balances required for managing minor changes.

Standard change

A standard change is a change that is low risk, relatively common and follows a specified procedure or work instruction, such as a configuration change, security patches, or other types of normal application modifications.

Standard changes have to go through the change management process. They require a peer review, Impacted Team(s) Management (or Code Owner) approval, and post-implementation review.

Note: Manager - prior to approving the change request, please ensure that the correct change request template is being used.

Comprehensive change

A comprehensive change is high risk, high impact, or has a more complex procedure, such as a system or application deprecation, a new system or application onboarding, or net-new Production architecture.

  • Infrastructure changes are considered comprehensive changes. They require peer review, Impacted Team(s) Management (or Code Owner) approval, Technical Owner Approval, and Post-Implementation Review.

Note: Manager - prior to approving the change request, please ensure that the correct change request template is being used.

Emergency change

An emergency change follows the same approval process as comprehensive changes.

  • It can be entered for approval after the change has been implemented in production.
  • Emergency changes are intended to be used only where there is an immediate critical need to correct an operational or security issue that is preventing users from working or critical processes from operating.
  • Emergency changes require review and all approvals after the change has been implemented.

Roles & Responsibilities

Role Responsibility
Security Governance Maintain a security change management procedure to intake and respond to change management activities
Maintain Metrics
Security Compliance Provide oversight to ensure changes are being made in accordance with compliance obligations
Requestor Complete the change management issue
Work with the Technical Owner to document, test, and obtain approval(s) for the change
Technical Owner As defined in the tech stack. Review and provide approval prior to the change being implemented
Work with the Requestor to ensure the requested change is documented, tested, and approval(s) have been completed
Ensure Peer Review is completed prior to providing Technical Owner Approval
Document and report any risks or trends identified during change management activities
Peer Review Review and ensure the requested change has been documented and there are no undocumented downstream impacts
Post Implementation Review Review of the change in production after the change is made to ensure everything is working as expected

Approval Matrix

Approval Type Description Minor Standard Comprehensive Emergency
Peer Review Peer Reviews are performed by a peer of the change Requestor and are intended to identify any potential issues with the planned change or change process. Note: The peer review process was established to mitigate the risk of the lack of segregation of duties between Requestor and implementer. The review provides comfort that changes to the production environment are valid. No Yes Yes Yes
Post-Implementation Review Performed by a peer of the change Requestor and is intended to ensure the change is working as expected after the change has been implemented in Production. No Yes Yes Yes
Impacted Team(s) Management/Code Owner approval Approval by Management that is responsible for the particular system or application No Yes Yes Yes
Technical Owner Approval Approval by the system or application’s Technical Owner as defined in the tech stack. No No Yes Yes

Note: Technical Owner approval is dependent upon the system or application already existing in the tech stack. For new systems or applications that have not yet been assigned a Technical Owner in the tech stack, reach out to the Security Risk Team.

Procedure

To submit a security change request, use one of the links below to create a change request issue:

Standard Change Request

Comprehensive Change Request

Emergency Change Request

Follow the instructions in the appropriate issue template to:

Security Change Management project

Communication

If a security change request will impact all GitLab team members, please ensure that you communicate the change and its impact by posting in #whats-happening-at-gitlab or #company-fyi-private if the change is subject to SAFE or considered highly sensitive, before the work begins and after the change is completed.

Be sure to communicate the change, its rationale, and its impact.

If a security change request will impact all Security Division team members, please ensure that you communicate the change and its impact by posting in #security-team-only before the work begins and after the change is completed.

Be sure to communicate the change, its rationale, and its impact.

If a security change request will impact a particular Security Department or individual team members, please ensure that you communicate the change and its impact in a manner appropriate for those impacted team members.

Exceptions

Exceptions to this procedure will be tracked as per the Information Security Policy Exception Management Process.

References

Last modified September 23, 2024: Fix broken links (d748cf8c)