{
  "title": "How to Implement Change Management for Projects and IT Assets to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-6-2: A Step-by-Step Guide",
  "date": "2026-04-13",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-implement-change-management-for-projects-and-it-assets-to-meet-essential-cybersecurity-controls-ecc-2-2024-control-1-6-2-a-step-by-step-guide.jpg",
  "content": {
    "full_html": "<p>This guide walks through a practical, step-by-step approach to implement change management for projects and IT assets to satisfy the Compliance Framework requirement ECC – 2 : 2024 Control 1-6-2 (Control - 1-6-2) — covering policy, roles, templates, tooling, technical controls, testing and rollback, CMDB updates, audit evidence and small-business examples so you can demonstrate compliance in real operations.</p>\n\n<h2>Overview: Requirement and Key Objectives</h2>\n<p>Requirement: Control 1-6-2 requires that all changes to projects and IT assets be managed through a controlled process that documents requests, risk assessments, approvals, testing, implementation, and post-change review. Key objectives are to prevent unauthorized or risky changes, ensure predictable deployments, maintain a current asset record, and provide auditable evidence for compliance. For small organizations this means implementing lightweight but rigorous controls that produce traceable records that an auditor can review.</p>\n\n<h2>Step-by-step implementation</h2>\n\n<h3>1) Governance, roles and policy</h3>\n<p>Start by defining a written change management policy aligned to the Compliance Framework. Policy should define roles (Change Requester, Change Owner, Change Approver/Change Authority, CAB members, Asset Owner, and Emergency Change Approver), change categories (Standard, Normal, Emergency), approval thresholds based on risk/impact, and retention periods for records. Small-business example: an e-commerce company with 25 staff designates the IT manager as Change Authority for low-risk config changes, but requires a 2-person approval (IT lead + business owner) for production releases that affect checkout or payments.</p>\n\n<h3>2) Change request template and assessment</h3>\n<p>Create a standardized change request form (ticket) with required fields: change title, change type, asset(s) impacted (with asset IDs), purpose, owner, planned start/end, change window, rollback plan, test plan, risk score (e.g., Low/Medium/High), required approvals, estimated downtime, business impact, and links to supporting artifacts (code repo PR, runbook, backup snapshots). Use a simple risk matrix (Likelihood × Impact) to set approval level. Example small-business template: Google Form/Airtable or a Jira ticket containing the above fields, with an attached pre-deployment checklist (backups taken, DB migration tested, feature flags ready).</p>\n\n<h3>3) Tooling, automation and technical controls</h3>\n<p>Choose tools that match maturity: ticketing systems (Jira/ServiceNow/Trello), version control (GitHub/GitLab/Bitbucket), CI/CD (GitHub Actions, GitLab CI), configuration management (Ansible, Puppet), and infrastructure as code (Terraform). Implement branch protection and required pull-request reviews for code changes; enforce automated tests and a successful 'terraform plan' review before infra applies. For systems management, use SCCM/Intune/WSUS or an MDM to schedule endpoint changes. Small-business low-cost stack: GitHub + GitHub Actions + Trello or Airtable for approvals; use branch protection and PR templates to enforce change records automatically. Technical specifics: enable signed commits, require PR approvals (n reviewers), configure pipeline to block deployment until all gates pass, and record pipeline run IDs in the change ticket for audit evidence.</p>\n\n<h3>4) Testing, rollback and emergency handling</h3>\n<p>Testing and rollback are critical controls. Maintain separate environments (dev, staging, production) and require successful regression tests in staging before production approval. Use blue/green or canary deployments and feature flags to reduce risk. Define explicit rollback commands/scripts and validate them in test runs — e.g., a rollback for an application release could be a git revert + redeploy pipeline command or running a database restore from a verified backup: pg_restore --clean --no-owner -d production_db /backups/pre_release.dump. For emergency changes, define a fast-track process: emergency change ticket created post-implementation with retroactive CAB review within 72 hours and mandatory post-implementation review documented in the ticket.</p>\n\n<h3>5) CMDB updates, logging and audit evidence</h3>\n<p>Integrate change outcomes with your CMDB/asset inventory so every change updates the asset record (version, configuration, owner). Keep immutable evidence: ticket IDs, approval timestamps, pipeline logs, test results, backups, and post-change review notes. Retention: store these artifacts for the period required by the Compliance Framework (typically 1–3 years depending on your policy). Small-business approach: if you don't have a full CMDB, maintain a controlled spreadsheet or Airtable with asset IDs and add a \"change history\" link column that stores the ticket URL and pipeline run ID for each change.</p>\n\n<h2>Risks, metrics and compliance tips</h2>\n<p>Risks of not implementing this control include unintended outages, configuration drift, data loss, regulatory fines, reputational damage and failed audits. Track KPIs to show compliance and operational health: Change Success Rate = (Total Successful Changes / Total Changes) × 100; Unauthorized Change Count; Mean Time to Deploy; Mean Time to Recovery (MTTR) after failed changes; and time-to-approval. Compliance tips: require evidence for each approval (no email-only approvals without ticket linkage), use least-privilege for deployment credentials, ensure segregation of duties where feasible, and schedule high-risk changes outside business hours with appropriate notifications. For small teams, automate as much evidence capture as possible — e.g., automatically post CI pipeline artifacts and approval metadata to the change ticket so auditors can trace events without manual logs.</p>\n\n<h2>Implementation Notes (Compliance Framework specific)</h2>\n<p>Map your artifacts to the Compliance Framework evidence requirements: policy document, change tickets, approval logs, test results, rollback evidence, CMDB entries, and post-implementation reviews. During an audit for ECC‑2:2024 Control 1-6-2, provide cross-referenced artifacts (ticket ID → pipeline run → CMDB record) and demonstrate the process applied to at least a sample set of projects and assets. If your organization is small, note this in the implementation plan and show compensating controls (e.g., automated pipeline gates, multi-person approval in PRs) to satisfy the intent of segregation of duties.</p>\n\n<p>Summary: Implementing change management to meet ECC – 2 : 2024 Control 1-6-2 is practical for organizations of any size by establishing policy and roles, using standardized change requests, applying automated technical controls (VCS, CI/CD, IaC), validating testing and rollback procedures, keeping the CMDB up to date, and retaining immutable evidence for audits. Start small with templates and automation, iterate based on incidents and audit feedback, and use the KPIs above to demonstrate continuous improvement and compliance.</p>",
    "plain_text": "This guide walks through a practical, step-by-step approach to implement change management for projects and IT assets to satisfy the Compliance Framework requirement ECC – 2 : 2024 Control 1-6-2 (Control - 1-6-2) — covering policy, roles, templates, tooling, technical controls, testing and rollback, CMDB updates, audit evidence and small-business examples so you can demonstrate compliance in real operations.\n\nOverview: Requirement and Key Objectives\nRequirement: Control 1-6-2 requires that all changes to projects and IT assets be managed through a controlled process that documents requests, risk assessments, approvals, testing, implementation, and post-change review. Key objectives are to prevent unauthorized or risky changes, ensure predictable deployments, maintain a current asset record, and provide auditable evidence for compliance. For small organizations this means implementing lightweight but rigorous controls that produce traceable records that an auditor can review.\n\nStep-by-step implementation\n\n1) Governance, roles and policy\nStart by defining a written change management policy aligned to the Compliance Framework. Policy should define roles (Change Requester, Change Owner, Change Approver/Change Authority, CAB members, Asset Owner, and Emergency Change Approver), change categories (Standard, Normal, Emergency), approval thresholds based on risk/impact, and retention periods for records. Small-business example: an e-commerce company with 25 staff designates the IT manager as Change Authority for low-risk config changes, but requires a 2-person approval (IT lead + business owner) for production releases that affect checkout or payments.\n\n2) Change request template and assessment\nCreate a standardized change request form (ticket) with required fields: change title, change type, asset(s) impacted (with asset IDs), purpose, owner, planned start/end, change window, rollback plan, test plan, risk score (e.g., Low/Medium/High), required approvals, estimated downtime, business impact, and links to supporting artifacts (code repo PR, runbook, backup snapshots). Use a simple risk matrix (Likelihood × Impact) to set approval level. Example small-business template: Google Form/Airtable or a Jira ticket containing the above fields, with an attached pre-deployment checklist (backups taken, DB migration tested, feature flags ready).\n\n3) Tooling, automation and technical controls\nChoose tools that match maturity: ticketing systems (Jira/ServiceNow/Trello), version control (GitHub/GitLab/Bitbucket), CI/CD (GitHub Actions, GitLab CI), configuration management (Ansible, Puppet), and infrastructure as code (Terraform). Implement branch protection and required pull-request reviews for code changes; enforce automated tests and a successful 'terraform plan' review before infra applies. For systems management, use SCCM/Intune/WSUS or an MDM to schedule endpoint changes. Small-business low-cost stack: GitHub + GitHub Actions + Trello or Airtable for approvals; use branch protection and PR templates to enforce change records automatically. Technical specifics: enable signed commits, require PR approvals (n reviewers), configure pipeline to block deployment until all gates pass, and record pipeline run IDs in the change ticket for audit evidence.\n\n4) Testing, rollback and emergency handling\nTesting and rollback are critical controls. Maintain separate environments (dev, staging, production) and require successful regression tests in staging before production approval. Use blue/green or canary deployments and feature flags to reduce risk. Define explicit rollback commands/scripts and validate them in test runs — e.g., a rollback for an application release could be a git revert + redeploy pipeline command or running a database restore from a verified backup: pg_restore --clean --no-owner -d production_db /backups/pre_release.dump. For emergency changes, define a fast-track process: emergency change ticket created post-implementation with retroactive CAB review within 72 hours and mandatory post-implementation review documented in the ticket.\n\n5) CMDB updates, logging and audit evidence\nIntegrate change outcomes with your CMDB/asset inventory so every change updates the asset record (version, configuration, owner). Keep immutable evidence: ticket IDs, approval timestamps, pipeline logs, test results, backups, and post-change review notes. Retention: store these artifacts for the period required by the Compliance Framework (typically 1–3 years depending on your policy). Small-business approach: if you don't have a full CMDB, maintain a controlled spreadsheet or Airtable with asset IDs and add a \"change history\" link column that stores the ticket URL and pipeline run ID for each change.\n\nRisks, metrics and compliance tips\nRisks of not implementing this control include unintended outages, configuration drift, data loss, regulatory fines, reputational damage and failed audits. Track KPIs to show compliance and operational health: Change Success Rate = (Total Successful Changes / Total Changes) × 100; Unauthorized Change Count; Mean Time to Deploy; Mean Time to Recovery (MTTR) after failed changes; and time-to-approval. Compliance tips: require evidence for each approval (no email-only approvals without ticket linkage), use least-privilege for deployment credentials, ensure segregation of duties where feasible, and schedule high-risk changes outside business hours with appropriate notifications. For small teams, automate as much evidence capture as possible — e.g., automatically post CI pipeline artifacts and approval metadata to the change ticket so auditors can trace events without manual logs.\n\nImplementation Notes (Compliance Framework specific)\nMap your artifacts to the Compliance Framework evidence requirements: policy document, change tickets, approval logs, test results, rollback evidence, CMDB entries, and post-implementation reviews. During an audit for ECC‑2:2024 Control 1-6-2, provide cross-referenced artifacts (ticket ID → pipeline run → CMDB record) and demonstrate the process applied to at least a sample set of projects and assets. If your organization is small, note this in the implementation plan and show compensating controls (e.g., automated pipeline gates, multi-person approval in PRs) to satisfy the intent of segregation of duties.\n\nSummary: Implementing change management to meet ECC – 2 : 2024 Control 1-6-2 is practical for organizations of any size by establishing policy and roles, using standardized change requests, applying automated technical controls (VCS, CI/CD, IaC), validating testing and rollback procedures, keeping the CMDB up to date, and retaining immutable evidence for audits. Start small with templates and automation, iterate based on incidents and audit feedback, and use the KPIs above to demonstrate continuous improvement and compliance."
  },
  "metadata": {
    "description": "Step-by-step guidance to implement change management for projects and IT assets to meet ECC‑2:2024 Control 1-6-2, including templates, tools, and small-business examples.",
    "permalink": "/how-to-implement-change-management-for-projects-and-it-assets-to-meet-essential-cybersecurity-controls-ecc-2-2024-control-1-6-2-a-step-by-step-guide.json",
    "categories": [],
    "tags": []
  }
}