Skip to main content
← All controls
A.8.31 / A.8.32 / CM-4 / CC8.1 ISO/IEC 27001:2022 Annex A ISO 27001

A.8.31 / A.8.32 — Is change management formal with separation of dev/test/production?

Demonstrate that the organization maintains formally documented change management procedures with enforced segregation of development, testing, and production environments, and that changes follow this process consistently.

Description

What this control does

This control requires organizations to implement a formal change management process that enforces logical and physical separation between development, test, and production environments. Changes must follow documented procedures including authorization, testing in non-production environments, and controlled promotion through defined stages before deployment to production. The separation prevents untested or unauthorized code from directly affecting operational systems and ensures changes undergo proper review, reducing the likelihood of service disruption or security vulnerabilities introduced through poorly managed deployments.

Control objective

What auditing this proves

Demonstrate that the organization maintains formally documented change management procedures with enforced segregation of development, testing, and production environments, and that changes follow this process consistently.

Associated risks

Risks this control addresses

  • Unauthorized changes deployed directly to production systems bypass security reviews and introduce exploitable vulnerabilities
  • Developers with direct production access accidentally deploy untested code causing service outages or data corruption
  • Malicious insiders exploit lack of separation to inject backdoors or malware into production systems without detection
  • Inadequate testing due to shared environments results in production failures that impact business operations and customer trust
  • Lack of change tracking and audit trails prevents forensic analysis following security incidents or compliance violations
  • Production data accessed in development/test environments exposes sensitive information to unauthorized personnel or insecure systems
  • Simultaneous changes deployed without coordination create conflicting configurations that destabilize production infrastructure

Testing procedure

How an auditor verifies this control

  1. Obtain and review the formal change management policy and procedures documentation, verifying it explicitly addresses environment separation and promotion workflows
  2. Request network diagrams and access control matrices showing logical or physical separation between development, test, and production environments
  3. Interview system administrators and developers to understand the practical workflow for promoting changes and identify any bypass mechanisms or emergency procedures
  4. Select a representative sample of 15-20 changes from the past 90 days across different system types and criticality levels from the change management system
  5. For each sampled change, trace the complete lifecycle from request through approval, testing evidence, and production deployment, verifying adherence to documented procedures
  6. Review access logs and privilege assignments to confirm developers lack direct write access to production systems and deployments occur through authorized release processes
  7. Examine configuration management or deployment automation tools to verify technical controls enforce the separation and prevent unauthorized cross-environment access
  8. Test a recent emergency change to verify expedited procedures still maintain separation principles and include post-implementation review documentation
Evidence required Auditors collect the change management policy document, change tickets with approval workflows and testing records, network topology diagrams showing environment segmentation, access control lists or IAM role assignments demonstrating developer restrictions from production, deployment pipeline configurations from CI/CD tools, and access logs showing change promotion activities. Screenshots from change management systems showing approval gates and environment-specific deployment records supplement the documentation.
Pass criteria All sampled changes demonstrate documented approval, testing in non-production environments, and controlled promotion to production, with technical controls and access restrictions enforcing environment separation and preventing direct developer access to production systems.