Control Objectives:
5.1 All changes to software are identified, assessed, and approved.
Test Requirements:
5.1.a The assessor shall examine vendor evidence and interview personnel to confirm:
- A mature process exists to identify, assess, and approve all changes to software.
- The process includes an analysis of the security impact of all changes.
- The process results in an inventory of all changes made to software, including a record of the determined security impact.
- All change-management decisions are recorded.
- All implemented changes are authorized by responsible personnel.
- The inventory of changes identifies the individual creator of the code and individual authorizing the change, for each code change.
- All decisions to implement changes are justified.
5.1.b For a sample of changes, the assessor shall examine software-specific and change-specific documentation or evidence to confirm the following:
- All changes are authorized by responsible personnel.
- All decisions to implement the changes are recorded and include justification for the change.
- The inventory of changes clearly identifies the individual creator of the code and the individual authorizing the change, for each code change.
Guidance:
All changes to software should be defined, documented, approved, and tracked so that any vulnerabilities attributed to such changes may be identified and resolved as quickly as possible. The harder it is to trace vulnerabilities back to the changes that introduced them, the longer it takes to resolve those vulnerabilities⎯thus placing the software at greater risk of attack or compromise.
It is imperative to understand the security risk of a change to the software to ensure that it is addressed accordingly. It often involves understanding the types of software functionality the change impacts (e.g., functionality that deals with encryption or authentication processes), the type of information assets that the functionality can access or manipulate, the likelihood of successful vulnerability exploitation, and the impact a successful attack may have on stakeholders.