Change Management Audit Program Guide
Change Management Audit Program Guide
Change Management
IS Audit/Assurance Program
Change Management
Column Name Description
Process Sub-area An activity within an overall process influenced by the enterprise's
policies and procedures that takes inputs from a number of sources,
manipulates the inputs and produces outputs
Control Objectives A statement of the desired result or purpose that must be in place to
address the inherent risk in the review areas within scope
Control Classification Another way to classify controls is by the way they address a risk
exposure.
Control Frequency Control activities can occur in real-time, daily, weekly, monthly, annually,
etc.
Testing Step Identifies the steps being tested to evaluate the effectiveness of the
control under review
Ref. COBIT 5 Identifies the COBIT 5 process related to the control objective or control
activities
Ref. Specifies frameworks and/or standards that relate to the control under
Framework/Standards review (e.g., NIST, HIPAA, SOX, ISO)
Ref. Workpaper The evidence column usually contains a reference to other documents
that contain the evidence supporting the pass/fail mark for the audit step.
Program
ment
Instructions
To make the audit program manageable, it is recommended to break out
the scope of the audit into sub-areas. The auditor can modify this field to
entity-specific names and terms. ISACA has used the most commonly used
terms as the basis to develop this audit program.
This field should describe in detail the steps necessary to test control
activities and collect supporting documentation. The auditor can modify
this field to meet entity-specific needs. ISACA has used a set of generic
steps develop this audit program.
Specify whether the overall control is effective (Pass) or not effective (Fail)
based on the results of the testing.
IS Audit/Assurance Program
Change Management
Ref. Control Control Control
Process Sub-area Risk Control Objectives Controls Type Class Frequency
Governance CO1. The change management process is subject C1. Management receives timely reports,
to management oversight to ensure the summarizing change management activities, key
consistent and timely processing of changes. performance indicators and escalation of issues
requiring management attention.
IS Audit/Assurance Program
Change Management
Ref. Control Control Control
Process Sub-area Risk Control Objectives Controls Type Class Frequency
Identify Change Needs CO1. Only changes that are authorized, evaluated C1. Management classifies, reviews and approves
and prioritized and the have resources required change requests. This control ensures that
should enter the change process. management has considered and approved the
changes in the queue.
1. Obtain the enterprise’s documented standards, processes, procedures and guidelines for BAI06.01
identifying, classifying and approving change requests.
2. Determine if a process exists to classify change requests as an infrastructure or application
change.
3. Determine if a process exists to perform a risk assessment focused on the impact of the change
on other systems or applications.
4. Determine if there is a process to perform impact analysis on changes to ensure business
process’s integrity and availability.
5. Determine if there is a process for performing an analysis of any compliance issues that would be
affected by the change request.
6. Determine if a resource budget is assigned to each change request.
7. Determine if a list exists of appropriate change requesters for each application.
8. Verify that the appropriate approvers within IT operations, IT systems development and the
business owner have approved the change and their approval is documented.
9. Determine if the change requests are subject to prioritization. If prioritization is performed,
determine if appropriate members of management review the priority assignation and
authorization regularly.
IS Audit/Assurance Program
Change Management
Ref. Control Control Control
Process Sub-area Risk Control Objectives Controls Type Class Frequency
Production Library CO1. Production libraries should be secure, C1. Access to production source is limited on a
Management allowing only authorized personnel to access the need-to-know basis. Programmers are limited to
production libraries. Management must provide READ access; only change management staff
oversight of access to libraries, good-practice members are assigned WRITE access.
separation of duties, and synchronization of
source and executable libraries.
(c) ISACA 2016 All Rights Reserved Production Library Management, Page 13
Audit/Assurance Program
Change Management
CO2. The production executable libraries contain C3. Access to production executable libraries is
the computer code to process the programs. limited on a "need-to-know" basis. Programmers
Access needs to be limited and monitoring are limited to READ access; only change
processes need to be in place to effectively management staff members are assigned WRITE
oversee change activities affecting the executable access.
libraries.
(c) ISACA 2016 All Rights Reserved Production Library Management, Page 14
Audit/Assurance Program
Change Management
1. Through interviews, observation and review of documentation, determine how version control BAI03.03;
operates and if it can be overridden. DSS02.03;
2. Through interviews, observation and review of documentation, determine if the functionality BAI07.06;
exists to roll back an update and restore a program to its previous version. DSS05.05
(c) ISACA 2016 All Rights Reserved Production Library Management, Page 15
Audit/Assurance Program
Change Management
1. Through interviews, observation and review of documentation, determine the controls limiting BAI03.03;
access to the production executable libraries. DSS02.03;
2. Determine if there is a separation of duties table identifying the access levels and to whom they BAI07.06;
are assigned. DSS05.05
3. Determine if ID access logs, including date and time stamps, are maintained and reviewed on a
regular basis.
4. Determine if access control lists are reviewed and updated regularly.
5. Test objective: To verify that access to the production executable libraries is provided on a
need-to-know basis:
- Based on risk, select the production executable libraries to be tested.
- Obtain the access control list for production executable libraries.
- Review the list and identify any personnel not in change management with WRITE access to the
libraries.
- Obtain the access log and identify unauthorized or suspect access to production libraries.
- Verify documented management review of the access control list and unusual activity logs.
1. Through interviews, observation and review of documentation, determine how version control BAI10.01-02;
operates and if version control can be overridden. BAI10.04;
2. Through interviews, observation and review of documentation, determine if the functionality BAI07.02;
exists to roll back an update program to its previous version. DSS02.01
1. Through interviews, observation and review of documentation, determine what control BAI07.06
techniques are utilized to ensure complete and accurate transmission of program changes.
2. Test objective: To verify the accuracy of distribution of executables to remote processors:
- Select a sample of executables.
- Determine the size, date and time of the executables to be distributed as they reside in the
master executable library.
- For the selected executable, determine the date and time transmitted and the size of the file at
the distributed computer.
- Evaluate the timeliness and completeness of the distribution.
(c) ISACA 2016 All Rights Reserved Production Library Management, Page 16
Audit/Assurance Program
Change Management
IS Audit/Assurance Program
Change Management
Ref. Control Control Control
Process Sub-area Risk Control Objectives Controls Type Class Frequency
Move to Production CO1. The move to the production process should C1. Program changes require sign-off by the
be controlled and documented. Access should be appropriate stakeholders prior to being moved
limited to authorized change management into production.
personnel. Only authorized changes should have
been made to production programs, and the
move process should ensure synchronization of
the source and executable libraries.
1. Through interviews, observation and review of documentation, determine the automated BAI06.01;
change management process. BAI06.02;
2. Walk through the process of entering a move ticket, approving the ticket, compiling the program BAI06.03;
and moving it into production. BAI06.04
3. Determine the controls to identify and authenticate the approver’s authority to move a program
into production.
4. Determine the available logs and reports generated by the change management system to trace
and research program moves into production.
5. Determine if there are “back doors” that allow bypassing of the change management software
system.
6. Determine if logs and reports generated by the change management system are reviewed by
management and if such reviews are formally documented.
7. Test objective: To verify that the change management software and user controls are effective:
- Based on the reviewer’s understanding of the automated move process, identify control points to
test (consider automated authorization, monitoring, logging capabilities, independent
recompilation of programs, etc.).
- Select several change tickets. Follow the selected change tickets through the process, verifying
compliance with identified controls.
BAI07.06
1. Document the process of moving the program from the test to the production environment.
2. Document the process of independently recompiling the programs by someone other than the
programmer, and placing the programs in a production library.
3. Where there is a lack of separation of duties, document alternative controls (program source and
executable compares, log date and time verification, etc.) used to ensure the integrity of the
program move-to-production process.
4. Test objective: To verify the effectiveness of the manual change management process:
- Identify key control points in the program change process (notification of program ready for move
to production, transfer of program from test to production library, compilation of source,
comparison of compilation and executable dates, etc.)
- Select a statistically valid sample size (at least 25 randomly selected moves to production).
- Trace the move to production against good practices and enterprise standards. Focus on the
documented evidence of management review.
1. Determine whether a comparison of source code before and after the modification is included in BAI03.03;
the documentation. DSS02.03;
2. Determine how management reviews the changes to ensure that only authorized changes have DSS05.05
been implemented.
3. Test objective: To verify the process of comparing authorized changes to completed changes:
- Select a sample (including emergency requests) from a population of move tickets.
- Obtain the change request supporting the move ticket.
- Based on the change request, obtain an understanding of the changes required.
- Run a source code comparison of the previous and current programs to identify the code changes.
- Perform a “reasonableness” test, ensuring that the changes requested in the systems request are
the same changes implemented.
1. Determine how the compile process generates the date and time stamp of compilation. BAI06.04;
2. Determine that the executable library documents the date and time of update. BAI10.03
3. Determine the process that ensures that all executables in the library have move tickets.
4. Test objective: To verify that the production source and executable libraries are synchronized:
- Select a sample (including emergency requests) from a population of move tickets.
- Verify that the source compilation date and time agrees with the date and time of the executable.
- Select a few programs from the move log and recompile the programs using the production
compilation process, but saving the executable to a storage area controlled by the reviewer.
Compare the executable generated by the reviewer to the executable stored in the production
executable library, and identify differences.
5. Test objective: To verify that all executables have move-to-production tickets:
- Select several executable programs/modules from the production executable library. Trace the
executable to a move ticket.
IS Audit/Assurance Program
Change Management
Ref. Control Control Control
Process Sub-area Risk Control Objectives Controls Type Class Frequency
Emergency Changes CO1. Emergency changes should be controlled, C1. Changes using the emergency change
documented and initiated only in true procedure are initiated only for changes where
emergencies. time is of the essence.
1. Through interviews, observation and review of documentation, determine the process used to BA06.02
review testing procedures before an emergency change is accepted into production.
2. Determine if a list of authorized requesters for emergency changes exists.
3. Test objective: To verify that emergency change authorization was approved prior to the
introduction of the change into the production environment:
- Select emergency changes from several sources.
- Review the existence of test results and management review.
1. Through interviews, observation and review of documentation, determine the process used to BA06.02
authorize emergency moves to production. Differentiate between minor and major enhancements,
operating system, configuration files and source programs.
2. Test objective: To verify that change authorizations were documented prior to the introduction
of the change into the production environment:
- Select a representative sample of emergency changes.
- Determine if the move into production was properly authorized.
1. Determine if the emergency changes are executed from a temporary or test library, or copied BA06.02
into the protected production library.
2. If programs are copied into the production libraries, identify the controls to protect the libraries
from unauthorized updates by the analyst/programmer initiating the changes.
3. Determine if one-time passwords are utilized to protect libraries.
4. If one-time passwords are utilized, evaluate the effectiveness of the one-time password controls
to ensure that the passwords are not reused and the individual utilizing the password can be
identified easily.
5. If the controls to protect the production libraries do not include one-time passwords, document
and evaluate the effectiveness of the other controls.
6. Test objective: To verify the effectiveness of the change control process that ensures the
integrity of the production libraries and application data:
- Select a sample of emergency moves to production.
- Determine if the program was run from an interim library or the production library.
- If the production library was used, determine if a one-time password was retrieved.
- Determine if the one-time password was disabled.
1. Through interviews, observation and review of documentation, determine the process for BA06.02
reviewing emergency changes.
2. Determine what controls are in place to ensure that the data processed used the updated
program
3. For high-risk applications, it may be necessary to perform a comparison of the data to ensure
that essential fields have not been changed
4. Through interviews, observation and review of documentation, determine after-the-fact quality
assurance procedures, recompilation procedures, etc., to align the emergency change with
standard move-to-production procedures
5. Test objective: To verify the effectiveness of the change management quality assurance process
and appropriate authorization
- Select a sample of emergency moves to production.
- Review the sign-off process to ensure that all signoffs were completed within a reasonable period
after the move to production and that the appropriate personnel approved the move.
- The programming function indicates completion of testing, quality assurance and documentation.
- Users indicate satisfactory user acceptance test, approval and knowledge of implementation date.
- IT operations indicates acceptance of documentation, scheduling changes, backup changes, run-
time changes, etc.
- Information security indicates acceptance of information security changes.
- Documentation indicates satisfactory reviews by users, IT operations, backup/recovery business
continuity plan.
6. Review the move to production and compile logs to determine if the emergency program move
was subject to recompilation and was copied into the appropriate libraries.