Preventions
- Home
- - Preventions
- -PV080
- ID: PV080
- Created: 24th October 2025
- Updated: 24th October 2025
- Contributor: The ITM Team
Change Management
Implement a comprehensive organizational change management framework that governs all modifications to infrastructure, systems, applications, configurations, and access policies. Without formal change control, subjects may introduce unauthorized changes that bypass controls, enable persistent access, disrupt availability, or conceal malicious activity under the guise of routine maintenance. Effective change management provides structured oversight that makes all changes attributable, reviewable, and auditable.
A mature change management program includes: centralized change request submission, classification by operational risk, dual authorization for sensitive modifications, enforcement of scheduled implementation windows, post-change validation, and configuration state reconciliation. This applies equally to on-premises infrastructure (e.g., network ACLs, hypervisors, firewalls), cloud-native resources (e.g., AWS security groups, Azure NSGs, GCP IAM), DevOps pipelines, and identity/access control systems.
Organizations should implement their change processes using industry-aligned ITSM platforms or integrated DevSecOps workflows. Common software platforms include ServiceNow, Jira Service Management, BMC Helix, Freshservice, and integrations with CI/CD pipelines (e.g., GitHub Actions, GitLab CI, Terraform Cloud) that enforce policy-as-code for configuration control.
Change Request and Classification
- All changes must be submitted through a centralized Change Management System (CMS)
- Requests must include: category (e.g., network, identity, application), scope, justification, risk, and implementation window
Changes must be classified based on business impact (e.g., segmentation, access control, availability)
Approval and Oversight
- High-impact or trust boundary changes require dual approval (technical and business approver)
- Separation of duties must be enforced between requestor and approver
- Emergency changes must be time-bound, documented, and retroactively reviewed
Implementation and Validation
- Changes must occur within approved maintenance windows
- Pre-change state (e.g., config snapshots, baselines) must be captured
- Post-change verification must confirm success and be documented
- Any deviations from approved scope or schedule must be logged and reviewed
Auditability and State Monitoring
- Change records must be immutable, timestamped, and retained according to policy
- All changes must be linked to authentication and privileged session records
- Configuration drift detection must identify unapproved or out-of-band modifications
Policy and Governance
- Change management controls must be embedded in formal policy
- Internal audits must compare CMS records to infrastructure state (at least) quarterly
- Administrators and approvers must receive annual secure change training
- Non-compliant changes must be investigated and result in corrective or disciplinary actions
Sections
| ID | Name | Description |
|---|---|---|
| PR018.008 | Bypassing Network Segmentation | A subject bypasses logical or physical network segmentation controls (such as VLANs, ACLs, security groups, or subnets) in order to obtain unauthorized access to systems, services, or data across trust boundaries. This preparation technique commonly manifests through deliberate configuration changes (e.g., modifying ACLs or VLAN assignments), covert tunneling (e.g., SSH, HTTPS reverse tunnels), rogue device introduction (e.g., unmanaged switches or dual-homed devices), or misuse of trusted services (e.g., remote access platforms or admin automation tools that bridge zones).
Such actions are often observable via first-time or anomalous cross-segment flows, management plane configuration logs, 802.1X/NAC anomalies, or long-lived encrypted outbound sessions. These techniques typically exploit privileged access, weak change control, or poor posture enforcement.
This behaviour may be motivated by a subject’s attempt to escalate access, stage data for exfiltration, evade oversight, or maintain persistence across environments. It is especially critical in environments with sensitive zoning, such as production-to-dev separations, cloud VPC peerings, or physically segmented OT/ICS networks.
Investigators should prioritize telemetry correlation across NetFlow/IP Flow Information Export (IPFIX), EDR, DHCP, and identity systems to attribute cross-zone traffic to known assets and subjects. Preserve infrastructure configuration snapshots and identify whether segmentation was circumvented by direct administrative action, covert bridging, or software-level tunnelling. |
| IF013.002 | Operational Disruption Impacting Customers | The subject deliberately interferes with operational systems in ways that degrade, interrupt, or misroute services relied upon by customers, without relying on file deletion or malware. This includes misconfigurations, service disabling, authentication interference, or intentional introduction of latency, instability, or incorrect outputs. The result is operational degradation that directly or indirectly affects service delivery, availability, or trust.
Unlike File or Data Deletion, this infringement does not depend on erasing data, and unlike Destructive Malware Deployment, it does not rely on malicious payloads or automated damage. The disruption instead stems from direct manipulation of infrastructure, configurations, service states, or user access.
Examples include:
These actions may be motivated by retaliation, concealment, sabotage, or insider coercion, and often occur in environments where the subject has legitimate system access but uses it to destabilize service delivery covertly. |
| IF011.001 | Intentionally Weakening Network Security Controls For a Third Party | The subject intentionally weakens or bypasses network security controls for a third party, such as providing credentials or disabling security controls. |
| IF014.007 | Creation of Cloud Resources | A subject provisions cloud-based resources without prior authorization or a documented business justification. This unauthorized activity may circumvent established governance, security, or cost-management controls, potentially exposing the organization to operational, financial, or regulatory risk. |
| IF014.005 | Deletion of Cloud Resources | A subject deliberately or negligently deletes cloud-based resources, leading to the disruption, degradation, or complete interruption of organizational operations. Deletion of critical resources may result in the permanent loss of data, service outages, impaired system performance, or the failure of customer-facing applications. Such actions often violate organizational policies governing change management, data retention, disaster recovery, and access control, and may expose the firm to significant operational, financial, legal, and reputational risks.
|
| IF014.006 | Deletion of Other IT Resources | The subject deletes IT resources resulting in harm to the organization. Examples include virtual machines, virtual disk images, user accounts, and DNS records. |
| IF014.004 | Modification of Access Controls | The subject makes unauthorized changes to access controls resulting in harm. Examples include resetting/changing passwords, locking accounts, or deleting accounts. |
| IF014.001 | Modification of DNS Records | The subject creates, deletes, or edits DNS records resulting in harm. Examples include altering MX records to affect the availability of email communication, removing A records to affect the availability of web resources, or altering A records to redirect traffic to an unintended location. |
| IF014.002 | Modification of Firewall Rules | A subject makes an unauthorized change to the rule table of a network-based firewall, resulting in impaired security, impacted availability or to bypass network segmentation. |