CMMC Practice CM.L2-3.4.4 – Security Impact Analysis: Analyze the security impact of changes prior to implementation.
Links to Publicly Available Resources
This document provides tips, tools, and techniques for leading a successful change initiative This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2. Cyber Management Alliance is company that offers consulting services for change management specifically security change management. This site provides various resources for the change management process based on ITIL. It also allows for a free ITSM trial. This blog reviews the ITIL change management process and covers various models and workflows that are part of this process. This is a blog from Plutora on ITIl V4 change management. This SANS whitepaper covers how to implement and re-implement change policies. This is a blog that covers change management and configuration management and their revolutionizing cybersecurity. IT change management describes the practices designed to ensure successful prioritizing, approval, scheduling, and execution of changes to IT systems. This site provides examples of templates that can be used throughout change management process such as change management template, change proposal template, change management communications plan template, etc. This guidance from US-CERT is intended for organizations seeking help in establishing a configuration and change management process and for organizations seeking to improve their existing configuration and change management process. This is a video from Simplilearn that covers ITIL Change Management process.
Discussion [NIST SP 800-171 R2]
Organizational personnel with information security responsibilities (e.g., system administrators, system security officers, system security managers, and systems security engineers) conduct security impact analyses. Individuals conducting security impact analyses possess the necessary skills and technical expertise to analyze the changes to systems and the associated security ramifications. Security impact analysis may include reviewing security plans to understand security requirements and reviewing system design documentation to understand the implementation of controls and how specific changes might affect the controls. Security impact analyses may also include risk assessments to better understand the impact of the changes and to determine if additional controls are required.
NIST SP 800-128 provides guidance on configuration change control and security impact analysis.
Further Discussion
Changes to complex environments are reviewed for potential security impact before implemented. Changes to IT systems can cause unforeseen problems and have unintended consequences for both users and the security of the operating environment. Analyze the security impact of changes prior to implementing them. This can uncover and mitigate potential problems before they occur.