graphgrc

Change Management Process

Process for managing changes to production systems to maintain security and stability.

Roles and Responsibilities

Prerequisites

Process Steps

Step 1: Change Proposal

Engineer creates pull request or change ticket describing proposed change.

PR/ticket includes:

Owner: Engineer Duration: Time to write PR description

Step 2: Automated Testing

CI/CD pipeline runs automated tests on proposed change.

Tests:

Gate: All tests must pass before merge

Owner: Automated CI/CD Duration: 5-15 minutes

Step 3: Peer Review

One or more engineers review the change.

Review criteria:

Approval required: Minimum 1 approval for standard changes, 2 for high-risk

Owner: Peer Reviewer Duration: Hours to days (depending on change size)

Step 4: Security Review (if needed)

Security team reviews security-sensitive changes.

Triggers for security review:

Owner: Security Team Duration: 1-2 business days

Step 5: Staging Deployment

Change deployed to staging environment for validation.

Validation:

Owner: Engineer, QA (if applicable) Duration: Hours to days

Step 6: Production Deployment

Change deployed to production via CI/CD pipeline or manual deployment.

Deployment requirements:

Deployment methods:

Owner: Engineer, Infrastructure Team Duration: Minutes to hours

Step 7: Post-Deployment Verification

Engineer verifies change successful and monitors for issues.

Verification:

Monitoring period: 30 minutes minimum

Owner: Engineer Duration: 30 minutes - 2 hours

Step 8: Rollback (if needed)

If issues detected, rollback to previous version.

Rollback triggers:

Rollback methods:

Owner: Engineer, Infrastructure Team Duration: 5-15 minutes

Emergency Changes

For critical security patches or production outages, expedited process allowed:

  1. Create PR with “EMERGENCY” label
  2. Post to #engineering Slack channel
  3. Minimal review (1 approval, can be post-deployment)
  4. Deploy immediately
  5. Retrospective within 24 hours to review process

Change Categories

Standard changes: Low-risk, pre-approved patterns (dependency updates, bug fixes)

Normal changes: Most code and infrastructure changes

High-risk changes: Database schema changes, major architecture changes

Validation and Evidence

References

Control Mapping


Referenced By

This section is automatically generated by make generate-backlinks. Do not edit manually.