ISO 27001:2022 Annex A 8.32 Change Management Explained
Let’s be honest, change is inevitable. Whether you’re upgrading a server, rolling out a new software feature, or just tweaking a firewall rule, things change in business all the time. But in the world of information security, change is also one of the biggest risks. If you don’t manage it properly, a simple update can turn into a massive security breach or a system outage.
That is exactly where ISO 27001:2022 Annex A 8.32 comes in. It’s the control dedicated to Change Management, and it’s there to stop us from tripping over our own feet when we try to improve things.
Table of contents
What is ISO 27001 Annex A 8.32?
In simple terms, Annex A 8.32 requires that any changes to your information processing facilities and information systems are subject to a formal change management procedure. The goal is to ensure that changes are controlled, recorded, and tested so they don’t negatively impact the confidentiality, integrity, or availability of your data.
This is a preventive control. It’s not just about fixing things after they break; it’s about making sure they don’t break in the first place.
If you are familiar with the older 2013 version of the standard, you might be looking for specific controls like A.12.1.2 or A.14.2.2. In the 2022 update, these have been consolidated. Annex A 8.32 effectively replaces and combines the requirements from the old Annex A 12.1.2, 14.2.2, 14.2.3, and 14.2.4. It’s a broader, more holistic view of change.
Why Do You Need This Control?
Aside from the fact that your auditor will be looking for it, change management is just good business practice. Without it, you are essentially gambling every time you touch your live systems.
Here is why it matters:
- Risk Reduction: It stops “quick fixes” from introducing new vulnerabilities.
- Accountability: You know exactly who made a change, when, and who authorised it.
- Stability: It prevents downtime caused by untested updates.
- Compliance: It provides the evidence auditors need to see that you are in control of your environment.
For more detailed insights on the standard itself, you can always check resources like ISO27001.com, which covers the broader context of the framework.
The 9 Essential Elements of a Change Management Procedure
So, what does a compliant process actually look like? You don’t need to overcomplicate it, but you do need to cover your bases. A robust procedure should generally include these nine elements:
1. Impact Assessment
Before you do anything, you need to understand the ripple effects. What will this change affect? Are there dependencies? You need to assess the potential impact on security and operations.
2. Authorisation Controls
Not everyone should be able to push a button and change production data. You need clear rules on who is allowed to propose changes and who has the authority to sign them off.
3. Stakeholder Communication
Don’t keep people in the dark. You must inform relevant internal and external parties about upcoming changes. If you are taking a service down for maintenance, your customers (and your support team) need to know.
4. Rigorous Testing
Never test in production if you can avoid it. You need to establish testing and acceptance procedures (often linking to Annex A 8.29). This ensures the change actually works and doesn’t break existing security measures.
5. Implementation Strategy
How do you plan to roll this out? You need a documented plan for the deployment itself to ensure it goes smoothly.
6. Emergency and Contingency Planning
What if it goes wrong? You need a “rollback” plan. If a change causes an issue, you must be able to revert to the previous secure state quickly.
7. Record Keeping
Write it down. You need to maintain records of all changes, including the approvals, test results, and implementation notes. This is your audit trail.
8. Documentation Updates
If you change a process or a system, your operating manuals and user guides are now out of date. Part of the process must be updating this documentation.
9. ICT Continuity Plan Review
Does this change affect your disaster recovery or business continuity plans? If you’ve added a new server, have you added it to the backup schedule? Always review your continuity plans after a significant change.
How to Implement It Practicality
Implementation doesn’t have to be a bureaucratic nightmare. For smaller organisations, a simple “Change Request Form” (even a digital one) might suffice. For larger enterprises, you might use a dedicated service management tool.
The flow usually looks like this:
- Request: Someone identifies a need for change and details it.
- Review: A manager or technical lead reviews the risk and impact.
- Approve: Formal sign-off is given.
- Test: The change is verified in a non-production environment.
- Implement: The change is applied to the live environment.
- Verify & Close: Post-implementation checks confirm success, and the ticket is closed.
Common Audit Pitfalls
When the auditor comes knocking, they are going to ask for evidence. Here are a few places where people often slip up:
- Lack of Evidence: You did the change perfectly, but there is no email, ticket, or log proving who approved it.
- Testing in Production: Auditors hate seeing “hot fixes” applied directly to live systems without a test trail.
- Outdated Documentation: You changed the system architecture but the network diagram is three years old.
By sticking to a structured process and ensuring every change is logged, assessed, and authorised, you will breeze through the requirements for Annex A 8.32.

