Skip to main content
NetStable
Level 2 CM.L2-3.4.4

Analyze the security impact of changes prior to implementation

📖 What This Means

This control requires organizations to evaluate how proposed changes to their systems or software might affect security before making those changes. Think of it like checking the weather before going on a hike—you want to know if there’s a storm coming so you can prepare. For example, if you’re updating your company’s software, you need to assess whether the update could introduce vulnerabilities or disrupt operations. Another example: adding new hardware to your network might seem harmless, but it could open doors for attackers if not properly secured. This practice ensures that changes don’t inadvertently weaken your defenses.

🎯 Why It Matters

Failing to analyze the security impact of changes can lead to serious vulnerabilities. For instance, in 2017, Equifax suffered a massive breach because they didn’t properly assess the security impact of a software update, leaving a critical vulnerability unpatched. This breach exposed the personal data of 147 million people and cost Equifax over $1.4 billion. From a DoD/CMMC perspective, uncontrolled changes can compromise the confidentiality, integrity, and availability of sensitive defense information. This control helps prevent such incidents by ensuring that changes are thoroughly vetted for security risks before implementation.

How to Implement

  1. 1. Use cloud-native change management tools (e.g., AWS Systems Manager Change Manager, Azure Change Tracking).
  2. 2. Integrate security assessment tools (e.g., AWS Inspector, Azure Security Center) into your change management process.
  3. 3. Automate impact analysis workflows using cloud orchestration tools (e.g., Terraform, CloudFormation).
  4. 4. Document all changes in a centralized change log with security impact assessments.
  5. 5. Conduct peer reviews of proposed changes using collaboration tools (e.g., Jira, ServiceNow).
⏱️
Estimated Effort
Implementation typically takes 2-3 weeks for small/medium organizations, requiring intermediate-level IT and security expertise.

📋 Evidence Examples

Change Request Form

Format: PDF/Doc
Frequency: Per change
Contents: Description of change, security impact assessment, approval signatures
Collection: Download from change management system

CCB Meeting Minutes

Format: PDF/Doc
Frequency: Per meeting
Contents: Discussion of proposed changes, security impact analysis, decisions made
Collection: Download from meeting notes

Vulnerability Scan Report

Format: PDF
Frequency: Per change
Contents: Pre- and post-change scan results, identified vulnerabilities
Collection: Export from scanning tool

📝 SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For CM.L2-3.4.4 ("Analyze the security impact of changes prior to implementation"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your configuration management process, including baseline configurations, change control procedures, vulnerability management, and how configuration compliance is monitored and enforced. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"CM.L2-3.4.4 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to analyze the security impact of changes prior to implementation. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"CM.L2-3.4.4 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to analyze the security impact of changes prior to implementation. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"CM.L2-3.4.4 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • Identify all system types within the CUI boundary requiring baselines
  • Document configuration management tools and CMDB
  • Map change control workflow from request to implementation
  • Ensure this control covers all systems within your defined CUI boundary where analyze the security impact of changes prior to implementation applies
  • Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • 📄 Configuration Management Policy
  • 📄 Baseline configuration documents
  • 📄 Change management records
  • 📄 CMDB/asset inventory
  • 📄 Evidence artifacts specific to CM.L2-3.4.4
  • 📄 POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will compare actual system configurations against documented baselines, review change tickets for proper approval workflow, and verify vulnerability remediation within SLA.

💬 Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do you have a documented process for analyzing the security impact of changes?

✅ YES → Proceed to Q2
❌ NO → GAP: Develop a formal change management policy. Timeline: 1 week.

Question 2: Are security impact assessments conducted for all changes?

✅ YES → Proceed to Q3
❌ NO → GAP: Implement mandatory security impact assessments. Timeline: 2 weeks.

Question 3: Are changes reviewed and approved by a designated authority?

✅ YES → Proceed to Q4
❌ NO → GAP: Establish a Change Control Board (CCB). Timeline: 1 week.

Question 4: Are vulnerability scans performed before and after changes?

✅ YES → Proceed to Q5
❌ NO → GAP: Integrate vulnerability scanning into the change process. Timeline: 2 weeks.

Question 5: Is there a centralized log of all changes with security impact assessments?

✅ YES → Compliant
❌ NO → GAP: Create a unified change log. Timeline: 1 week.

⚠️ Common Mistakes (What Auditors Flag)

1. No formal change management process

Why this happens: Small organizations often rely on ad-hoc changes.
How to avoid: Develop and document a formal change management policy.

2. Skipping security impact assessments

Why this happens: Pressure to implement changes quickly.
How to avoid: Make security impact assessments mandatory.

3. Incomplete documentation

Why this happens: Lack of standardized templates.
How to avoid: Use templates for change requests and assessments.

4. No vulnerability scans

Why this happens: Limited resources or tools.
How to avoid: Integrate automated scanning tools.

5. No centralized change log

Why this happens: Changes tracked in multiple systems.
How to avoid: Use a unified change management system.

📚 Parent Policy

This practice is governed by the Configuration Management Policy

View CM Policy →

📚 Related Controls