🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-6-2

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-6-2

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-6-2 – The cybersecurity requirements in project and assets (information/technology) change management must include at least the following:

Understanding the Requirement

This control requires that change management for projects and IT/information assets explicitly include defined cybersecurity requirements and objectives so changes do not introduce new vulnerabilities or disrupt security controls. As specified by the framework Essential Cybersecurity Controls (ECC – 2 : 2024), the control references objectives 1-6-2-1 and 1-6-2-2; in practical terms you must capture and enforce security-related steps (for example documentation, risk assessment, approvals, testing, rollback planning and asset updates) as mandatory parts of any change to systems, applications, or asset configurations.

Technical Implementation

  • Change request template that includes security fields — Create a simple, mandatory change request form (in your ticketing system or an editable spreadsheet) that forces submitters to document: affected asset(s) by unique ID, purpose of change, risk assessment summary, required security controls, test plan, rollback plan, and expected outage window. Make these fields required before a request moves to approval.

  • Asset linkage and inventory update — Ensure every change references the canonical asset inventory entry (server, VM, application, database). After a change is approved and implemented, update the inventory immediately with new configuration, owner, version, and security posture notes so risk tracking stays current.

  • Role-based approval workflow with security gate — Define at least two approval roles for non-trivial changes: a technical approver (system owner or engineer) and a security approver (IT security lead or designated reviewer). Automate or enforce this workflow so changes cannot proceed to production without both approvals.

  • Testing and validation in staging — Require that all changes affecting security boundaries or sensitive data be executed first in a staging environment that mirrors production. Document test results (including security tests) on the change ticket and require sign-off before scheduling a production window.

  • Rollback and contingency planning — For every change, document an explicit rollback procedure and a short checklist to verify rollback success. Include criteria that trigger rollback (e.g., failed smoke test, degraded performance, error rate threshold) and assign a rollback owner and timeline.

  • Logging, monitoring and post-change review — Enable logging of change implementation steps and require a 24–72 hour post-change monitoring period with a short review note capturing lessons learned, incidents, or follow-up security tasks. Keep change records for audit and incident investigation.

Example in a Small or Medium Business

Acme HR Solutions, a 40-person company, needs to update its payroll application to support a new tax rule. The engineering lead files a change request in the team's ticketing tool and links the payroll server asset ID from the company inventory. The request includes a risk assessment noting that payroll data is sensitive, a test plan to run payroll calculations in staging, and a rollback plan to restore the previous database snapshot if results differ. The change is routed to the system owner for technical approval and to the security lead for a security gate review; both must approve before scheduling a maintenance window. The team implements the update in staging, runs automated and manual security checks, and documents all test outcomes on the ticket. During the scheduled off-hours window they deploy to production, monitor the system for 48 hours, and run a post-change review to update the asset record and assign remediation tasks for any minor issues found during monitoring.

Summary

By embedding explicit security fields into change requests, linking changes to a maintained asset inventory, enforcing role-based approvals, testing in staging, documenting rollback plans, and performing post-change monitoring and reviews, SMBs can satisfy Control 1-6-2’s requirement that cybersecurity be part of project and asset change management. These policy and technical measures are lightweight enough for small teams yet rigorous enough to reduce the risk of introducing vulnerabilities or service disruptions when changes are made.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes