Skip to content

Change Requests

Change requests are submitted through the Request Services page under the Change Requests category. All changes to systems within the authorization boundary must be formally documented through a change request to maintain compliance with FedRAMP and CMMC change management requirements.

Change Request Form

The change request form captures the full scope of a proposed change, including its type, category, justification, risk assessment, and implementation plan.

Change request form overview

Form Fields

Field Purpose
Change Type Classifies the nature and urgency of the change (see below)
Category Identifies the operational domain and specific activity (see below)
Summary Brief description of what is being changed
Impact Rich text field to describe the scope of impact on systems, users, and services
Justification Why this change is necessary, tying back to compliance requirements, security findings, or operational needs
Risk Assessment of risk associated with the change
Change Plan Step-by-step description of how the change will be executed
Test Plan How the change will be validated after implementation
Implementation Plan Detailed execution plan including sequencing and dependencies
Backout Plan / Rollback Steps to reverse the change if issues arise during or after implementation
Communication Plan Who needs to be notified before, during, and after the change
Affected Assets Systems, components, or infrastructure impacted by the change (select from the asset inventory)
Change Schedule Start date/time, target completion date/time, and estimated duration

Change Types

The Change Type field classifies the nature of the change being requested. Selecting the correct type ensures proper review, approval routing, and audit documentation.

Change Type Description Compliance Context
Routine Recurring Pre-approved, regularly scheduled changes such as patching cycles or certificate renewals Supports FedRAMP CM-3 and CMMC CM.L2-3.4.3 by establishing predictable, documented change patterns that auditors can verify
Adaptive Changes made in response to environmental shifts such as vendor updates, dependency upgrades, or infrastructure adjustments Aligns with FedRAMP CM-4 (impact analysis); requires assessment of how external changes affect the security posture
Transformative Significant architectural or functional changes such as new service deployments, major upgrades, or boundary modifications May constitute a FedRAMP Significant Change requiring notification and potentially reassessment under the continuous monitoring program
Impact Categorization Changes that affect the FIPS 199 categorization or security impact level of a system or its data Directly tied to FedRAMP RA-2 and CMMC requirements; changes to impact levels can affect the entire authorization baseline
Interim Requirement Changes driven by interim compliance directives, binding operational directives (BODs), or emergency security guidance Supports timely response to CISA BODs and FedRAMP PMO directives that require action within defined timeframes
Emergency Critical changes that must be implemented immediately to address active security incidents, outages, or zero-day vulnerabilities FedRAMP CM-3 allows for emergency changes with expedited approval, but requires full documentation after the fact

Categories

The Category field identifies the operational domain and specific activity for the change. This categorization supports accurate reporting and audit trail requirements.

Continuous Monitoring

Category Description
Flaw Remediation Patching, vulnerability remediation, and security fixes identified through scanning or assessment. Directly supports FedRAMP SI-2 and CMMC SI.L2-3.14.1 flaw remediation requirements

Engineering

Category Description
Configuration Changes to system settings, security baselines, or hardening configurations. Supports FedRAMP CM-6 and CMMC CM.L2-3.4.2 security configuration settings requirements
Deployment Deploying new components, services, or infrastructure within the authorization boundary
Development Code changes, feature development, or application modifications within the system
Maintenance Scheduled system maintenance, hardware replacements, or infrastructure upkeep. Supports FedRAMP MA-2 controlled maintenance requirements
Testing Security testing, penetration testing, or validation activities that may affect production systems

Approval Workflow

By default, change requests follow the two-stage approval workflow described in the Approvals section. The Change Advise Board (CAB) reviews and approves the request on the technical side first, before it is forwarded to the designated end user with the Change Approver role for final sign-off. Approval processes can be customized to suit your organization's needs.