Change Management Policy

1. Purpose

The purpose of this document is to manage the risk posed by changes in the company and to inform all DefectDojo employees and external parties with access to DefectDojo equipment, systems, or networks (DefectDojo Staff) of their obligations with regards to the change management of all systems, networks, IT assets, and licensed software, owned, operated, or used by DefectDojo.

2. Scope

Change management as applied to information security, including the confidentiality, integrity, and availability of company-owned, processed, stored, and transmitted information.

3. Compliance

3.1 Compliance Measurement

The Information Security Management team will verify compliance to this document through various methods, including but not limited to business tool reports, internal and external audits, and feedback to the document owner.

3.2 Exceptions

Any exception to the policy must be reviewed and approved in advance by the Management Review Team.

3.3 Non-Compliance

Any DefectDojo Staff found to have violated this document may be subject to disciplinary action, up to and including termination of employment.

3.4 Continual Improvement

This document is updated and reviewed as part of the continual improvement process.

4. Requirements

4.1 Request for Change

Change requests are made via the company change platform and process.

4.2 Change Request Approval

Changes are approved by departmental managers and/or the senior management team before implementation.

4.3 Change Register

A register of changes is maintained.

4.4 Change Prioritization / Classification

All change requests are prioritized in terms of benefit, urgency, the effort required, and potential impact on company operations.

4.5 Change Risk Assessment

Changes are assessed for risk following the Risk Management Policy and Risk Management Procedure.

4.6 Change Impact Assessment

Changes are assessed for positive and negative impacts to customers and DefectDojo.

4.7 Testing

Changes are tested in an isolated, controlled, and representative environment, where feasible, before implementation to minimize the risks to company processes, operations, security, and clients.

4.8 Version Control

Software changes and updates are controlled with version control. Older versions are retained in accordance with retention and storage processes.

4.9 Communicating Change

All users or user representatives impacted by a change are notified of the change.

4.10 Rollback

Procedures to roll back or recover from an unsuccessful change are in place, where appropriate.

4.11 Change Freeze

At certain critical times of the year, it may be necessary to impose a non-essential change freeze period. A change freeze may be approved by senior management, during which time only the highest priority changes will be approved and implemented.

4.12 Emergency Change

Emergency changes may operate outside the normal change process, but must be approved by senior management. In some cases, events are critical enough that they must be rushed through, creating an Emergency/Unscheduled Change. Each situation is different, and as much consideration as possible should be given to the potential consequences of attempting this type of change. It is still necessary to obtain sufficient approval for the change, which may be done by discussing the matter with a relevant service manager or section head and logging who it was concerned with and how it was approved.

4.13 Unauthorized Changes

Unauthorized changes are tracked and reported to the Management Review Team meeting and escalated to senior management as required. Unauthorized changes are subject to the Continual Improvement process.

5. Relevant Documents

  • N/A