Skip to main content
NetStable
Level 2 CM.L2-3.4.3

Track, review, approve/disapprove, and audit changes to systems

πŸ“– What This Means

This practice requires organizations to have a structured process for managing changes to their systems. This includes tracking every change, reviewing it for potential security impacts, approving or disapproving it based on the review, and auditing the changes to ensure they were implemented correctly. Think of it like a quality control process for system updatesβ€”it ensures that changes don't introduce vulnerabilities or disrupt operations. For example, when a software update is proposed, it should be documented, evaluated for risks, approved by a designated team, and then audited to confirm it was applied correctly. Another example is hardware changes, like adding a new server, which must go through the same process to ensure it aligns with security policies.

🎯 Why It Matters

Uncontrolled changes to systems can lead to security vulnerabilities, system outages, or unauthorized access. For instance, a 2021 breach at a major retailer occurred because an unapproved change introduced a vulnerability that hackers exploited, resulting in millions of dollars in losses and reputational damage. From the DoD's perspective, this control is critical because defense contractors handle sensitive government information. Without proper change management, adversaries could exploit unapproved changes to steal classified data or disrupt critical systems. The potential impact includes financial penalties, loss of contracts, and damage to national security.

βœ… How to Implement

  1. 1. Use cloud-native change management tools like AWS Systems Manager Change Manager or Azure Change Tracking.
  2. 2. Define a change approval workflow in your cloud platform, ensuring it includes security review steps.
  3. 3. Enable logging for all changes using services like AWS CloudTrail or Azure Activity Log.
  4. 4. Regularly audit changes by exporting logs and reviewing them for unauthorized modifications.
  5. 5. Integrate change management with your SIEM (e.g., Splunk or Sentinel) for real-time monitoring.
  6. 6. Document all changes in a centralized repository, such as a ticketing system like Jira or ServiceNow.
⏱️
Estimated Effort
Implementation typically takes 10-20 hours for cloud environments and 20-40 hours for on-premise systems, depending on complexity. Requires intermediate-level IT and security skills.

πŸ“‹ Evidence Examples

Change Control Policy

Format: PDF/DOC
Frequency: Annual review, update as needed.
Contents: Documented process for tracking, reviewing, approving, and auditing changes.
Collection: Export from document management system.

Change Request Log

Format: CSV/Excel
Frequency: Monthly.
Contents: List of all change requests with details like requester, reviewer, and status.
Collection: Export from ticketing system.

CCB Meeting Minutes

Format: PDF/DOC
Frequency: After each meeting.
Contents: Summary of discussions and decisions made during Change Control Board meetings.
Collection: Export from meeting management tool.

Change Audit Report

Format: PDF
Frequency: Quarterly.
Contents: Results of audits verifying that changes were implemented correctly.
Collection: Generate from audit tool.

Training Records

Format: PDF/Excel
Frequency: Annual.
Contents: List of employees trained on change management procedures.
Collection: Export from HR system.

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For CM.L2-3.4.3 ("Track, review, approve/disapprove, and audit changes to systems"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your configuration management process, including baseline configurations, change control procedures, vulnerability management, and how configuration compliance is monitored and enforced. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"CM.L2-3.4.3 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to track, review, approve/disapprove, and audit changes to systems. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"CM.L2-3.4.3 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to track, review, approve/disapprove, and audit changes to systems. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"CM.L2-3.4.3 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Identify all system types within the CUI boundary requiring baselines
  • β€’ Document configuration management tools and CMDB
  • β€’ Map change control workflow from request to implementation
  • β€’ Ensure this control covers all systems within your defined CUI boundary where track, review, approve/disapprove, and audit changes to systems applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ Configuration Management Policy
  • πŸ“„ Baseline configuration documents
  • πŸ“„ Change management records
  • πŸ“„ CMDB/asset inventory
  • πŸ“„ Evidence artifacts specific to CM.L2-3.4.3
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will compare actual system configurations against documented baselines, review change tickets for proper approval workflow, and verify vulnerability remediation within SLA.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do you have a documented change control policy?

βœ… YES β†’ Proceed to Q2.
❌ NO β†’ GAP: Develop a change control policy. Use templates from NIST SP 800-53. Complete within 2 weeks.
Remediation:
Develop a change control policy. Use templates from NIST SP 800-53. Complete within 2 weeks.

Question 2: Are all changes tracked in a centralized log?

βœ… YES β†’ Proceed to Q3.
❌ NO β†’ GAP: Implement a ticketing system like Jira or ServiceNow. Complete within 1 month.
Remediation:
Implement a ticketing system like Jira or ServiceNow. Complete within 1 month.

Question 3: Is there a Change Control Board (CCB) to review and approve changes?

βœ… YES β†’ Proceed to Q4.
❌ NO β†’ GAP: Establish a CCB with defined roles. Complete within 2 weeks.
Remediation:
Establish a CCB with defined roles. Complete within 2 weeks.

Question 4: Are changes audited regularly to verify compliance?

βœ… YES β†’ Proceed to Q5.
❌ NO β†’ GAP: Schedule quarterly audits using tools like Nessus. Complete within 1 month.
Remediation:
Schedule quarterly audits using tools like Nessus. Complete within 1 month.

Question 5: Are employees trained on change management procedures?

βœ… YES β†’ FULL COMPLIANCE.
❌ NO β†’ GAP: Conduct training sessions and document attendance. Complete within 2 weeks.
Remediation:
Conduct training sessions and document attendance. Complete within 2 weeks.

⚠️ Common Mistakes (What Auditors Flag)

1. Incomplete change documentation.

Why this happens: Lack of a centralized system or process.
How to avoid: Use a ticketing system and enforce mandatory fields for all change requests.

2. Skipping security reviews.

Why this happens: Pressure to implement changes quickly.
How to avoid: Integrate security reviews into the change approval workflow.

3. Failure to audit changes.

Why this happens: Lack of resources or tools.
How to avoid: Use automated tools like Nessus or OpenSCAP for regular audits.

4. Missing training records.

Why this happens: Training not documented or tracked.
How to avoid: Maintain a training log in your HR system.

5. Unapproved changes.

Why this happens: Lack of enforcement or oversight.
How to avoid: Implement role-based access controls and monitor for unauthorized changes.

πŸ“š Parent Policy

This practice is governed by the Configuration Management Policy

View CM Policy β†’

πŸ“š Related Controls