Preventions
- Home
- - Preventions
- -PV080
- ID: PV080
- Created: 24th October 2025
- Updated: 24th October 2025
- Contributor: The ITM Team
Change Management
Implement a comprehensive organizational change management framework that governs all modifications to infrastructure, systems, applications, configurations, and access policies. Without formal change control, subjects may introduce unauthorized changes that bypass controls, enable persistent access, disrupt availability, or conceal malicious activity under the guise of routine maintenance. Effective change management provides structured oversight that makes all changes attributable, reviewable, and auditable.
A mature change management program includes: centralized change request submission, classification by operational risk, dual authorization for sensitive modifications, enforcement of scheduled implementation windows, post-change validation, and configuration state reconciliation. This applies equally to on-premises infrastructure (e.g., network ACLs, hypervisors, firewalls), cloud-native resources (e.g., AWS security groups, Azure NSGs, GCP IAM), DevOps pipelines, and identity/access control systems.
Organizations should implement their change processes using industry-aligned ITSM platforms or integrated DevSecOps workflows. Common software platforms include ServiceNow, Jira Service Management, BMC Helix, Freshservice, and integrations with CI/CD pipelines (e.g., GitHub Actions, GitLab CI, Terraform Cloud) that enforce policy-as-code for configuration control.
Change Request and Classification
- All changes must be submitted through a centralized Change Management System (CMS)
- Requests must include: category (e.g., network, identity, application), scope, justification, risk, and implementation window
Changes must be classified based on business impact (e.g., segmentation, access control, availability)
Approval and Oversight
- High-impact or trust boundary changes require dual approval (technical and business approver)
- Separation of duties must be enforced between requestor and approver
- Emergency changes must be time-bound, documented, and retroactively reviewed
Implementation and Validation
- Changes must occur within approved maintenance windows
- Pre-change state (e.g., config snapshots, baselines) must be captured
- Post-change verification must confirm success and be documented
- Any deviations from approved scope or schedule must be logged and reviewed
Auditability and State Monitoring
- Change records must be immutable, timestamped, and retained according to policy
- All changes must be linked to authentication and privileged session records
- Configuration drift detection must identify unapproved or out-of-band modifications
Policy and Governance
- Change management controls must be embedded in formal policy
- Internal audits must compare CMS records to infrastructure state (at least) quarterly
- Administrators and approvers must receive annual secure change training
- Non-compliant changes must be investigated and result in corrective or disciplinary actions
Sections
| ID | Name | Description |
|---|---|---|
| ME030 | Enterprise-Integrated AI Platforms | A subject operates within an environment where artificial intelligence (AI) platforms or agents are integrated across multiple enterprise systems, providing centralized access to data, services, or functionality within the organization.
These platforms are typically deployed to support productivity, knowledge retrieval, automation, or decision-making. As part of their implementation, they may be connected to internal repositories, collaboration tools, identity systems, ticketing platforms, or other business-critical services. Integration is often achieved through APIs, service accounts, or enterprise-wide indexing capabilities.
As a result, the AI platform may provide:
This form of integration creates a consolidated access layer within the environment that differs from standard user interaction patterns. Rather than accessing systems individually, the subject may interact with multiple data sources or services through the AI platform.
In some cases, the scope of access available through the platform may not align precisely with role-based access expectations, particularly where data is aggregated, summarized, or retrieved across systems. The platform may also operate with service account permissions or API-level access that are not directly accessible to the subject through traditional interfaces or individual user access controls, creating a divergence between user-level access and effective access via the platform.
This Section captures the availability of AI platforms that are integrated into the enterprise environment with broad access to data or systems. While deployed for legitimate operational purposes, such platforms may provide expanded capability that can be leveraged by a subject in the course of insider activity. |
| PR018.008 | Bypassing Network Segmentation | A subject bypasses logical or physical network segmentation controls (such as VLANs, ACLs, security groups, or subnets) in order to obtain unauthorized access to systems, services, or data across trust boundaries. This preparation technique commonly manifests through deliberate configuration changes (e.g., modifying ACLs or VLAN assignments), covert tunneling (e.g., SSH, HTTPS reverse tunnels), rogue device introduction (e.g., unmanaged switches or dual-homed devices), or misuse of trusted services (e.g., remote access platforms or admin automation tools that bridge zones).
Such actions are often observable via first-time or anomalous cross-segment flows, management plane configuration logs, 802.1X/NAC anomalies, or long-lived encrypted outbound sessions. These techniques typically exploit privileged access, weak change control, or poor posture enforcement.
This behaviour may be motivated by a subject’s attempt to escalate access, stage data for exfiltration, evade oversight, or maintain persistence across environments. It is especially critical in environments with sensitive zoning, such as production-to-dev separations, cloud VPC peerings, or physically segmented OT/ICS networks.
Investigators should prioritize telemetry correlation across NetFlow/IP Flow Information Export (IPFIX), EDR, DHCP, and identity systems to attribute cross-zone traffic to known assets and subjects. Preserve infrastructure configuration snapshots and identify whether segmentation was circumvented by direct administrative action, covert bridging, or software-level tunnelling. |
| IF013.002 | Operational Disruption Impacting Customers | The subject deliberately interferes with operational systems in ways that degrade, interrupt, or misroute services relied upon by customers, without relying on file deletion or malware. This includes misconfigurations, service disabling, authentication interference, or intentional introduction of latency, instability, or incorrect outputs. The result is operational degradation that directly or indirectly affects service delivery, availability, or trust.
Unlike File or Data Deletion, this infringement does not depend on erasing data, and unlike Destructive Malware Deployment, it does not rely on malicious payloads or automated damage. The disruption instead stems from direct manipulation of infrastructure, configurations, service states, or user access.
Examples include:
These actions may be motivated by retaliation, concealment, sabotage, or insider coercion, and often occur in environments where the subject has legitimate system access but uses it to destabilize service delivery covertly. |
| IF011.001 | Intentionally Weakening Network Security Controls For a Third Party | The subject intentionally weakens or bypasses network security controls for a third party, such as providing credentials or disabling security controls. |
| IF014.007 | Creation of Cloud Resources | A subject provisions cloud-based resources without prior authorization or a documented business justification. This unauthorized activity may circumvent established governance, security, or cost-management controls, potentially exposing the organization to operational, financial, or regulatory risk. |
| IF014.005 | Deletion of Cloud Resources | A subject deliberately or negligently deletes cloud-based resources, leading to the disruption, degradation, or complete interruption of organizational operations. Deletion of critical resources may result in the permanent loss of data, service outages, impaired system performance, or the failure of customer-facing applications. Such actions often violate organizational policies governing change management, data retention, disaster recovery, and access control, and may expose the firm to significant operational, financial, legal, and reputational risks.
|
| IF014.006 | Deletion of Other IT Resources | The subject deletes IT resources resulting in harm to the organization. Examples include virtual machines, virtual disk images, user accounts, and DNS records. |
| IF014.004 | Modification of Access Controls | The subject makes unauthorized changes to access controls resulting in harm. Examples include resetting/changing passwords, locking accounts, or deleting accounts. |
| IF014.001 | Modification of DNS Records | The subject creates, deletes, or edits DNS records resulting in harm. Examples include altering MX records to affect the availability of email communication, removing A records to affect the availability of web resources, or altering A records to redirect traffic to an unintended location. |
| IF014.002 | Modification of Firewall Rules | A subject makes an unauthorized change to the rule table of a network-based firewall, resulting in impaired security, impacted availability or to bypass network segmentation. |
| ME030.001 | AI Platform Aggregated Data Access | A subject has access to an artificial intelligence (AI) platform that aggregates data from multiple internal systems and presents it through a unified interface, where access controls are insufficiently enforced or misaligned with underlying role-based access restrictions.
These platforms are typically configured to index, query, or retrieve information from enterprise repositories such as file storage systems, collaboration platforms, knowledge bases, and internal documentation systems. Data from these sources may be combined, summarized, or surfaced in response to a single query.
In some implementations, the platform aggregates data across repositories without consistently applying the access controls of the underlying systems. As a result, information may be surfaced through the AI interface that the subject would not ordinarily access through direct interaction with those systems.
The AI platform may provide:
This access model creates a divergence between the subject’s direct access permissions and the information available to them through the AI platform. Data that is distributed, restricted, or contextually separated within underlying systems may be surfaced together through aggregated queries.
The presence of aggregated data access with insufficiently constrained access controls provides the subject with a means to obtain information beyond their intended role-based scope, particularly where enterprise-wide indexing or broad query capabilities are implemented. |
| ME030.002 | AI Platform System Interaction Capability | A subject has access to an artificial intelligence (AI) platform that is integrated with internal systems and capable of interacting with those systems through APIs, service accounts, automation frameworks, or agent interaction protocols (e.g., Model Context Protocol (MCP)), where the platform operates with permissions or capabilities that exceed typical user-level access controls.
These platforms are connected to enterprise systems such as identity services, ticketing platforms, communication tools, file storage systems, and other operational applications. Integration enables the platform to execute actions, retrieve data, or interact with system functionality on behalf of the user.
In some implementations, the platform is granted broad or persistent permissions to support automation and cross-system functionality. These permissions may not align precisely with the subject’s role-based access and may allow the platform to perform actions or retrieve data beyond what the subject could achieve through direct interaction with the underlying systems.
The AI platform may:
This interaction model creates a divergence between the subject’s direct capabilities and the effective capabilities available through the AI platform. Actions that would normally require elevated access, multi-system coordination, or additional authorization may be performed through the platform’s integrated functionality.
The presence of AI platforms with system interaction capability and insufficiently constrained permissions provides the subject with a means to interact with internal systems and services beyond their intended role-based authority. |