Skip to main content

Change Management Standards Analysis

Date: 2026-02-11 Author: Claude (Opus 4.6) Project: PILOT Purpose: Research global change management standards applicable to CODITECT platform, both for internal compliance and customer-facing capabilities. Foundation for ADR-176.


1. Executive Summary

CODITECT operates as both a consumer and provider of change management: it must comply with change management standards internally (code, infrastructure, AI model changes) AND provide change management capabilities to its customers (component migration, configuration control, audit trails). This dual role requires a comprehensive framework that maps to recognized global standards.

Key finding: ADR-175 (Component Migration Process) established an excellent foundation aligning with ISO 10007, NIST SP 800-128, and ITIL v4 — but only for one change type (component relocation). CODITECT has 10+ distinct change types that need unified governance. ADR-176 will establish that unified framework.


2. Change Types in CODITECT

#Change TypeCurrent GovernanceGap Level
1Code changes (PRs, commits, branches)Git workflow, code reviewLOW - well-established
2Component migration (cross-repo relocation)ADR-175NONE - fully governed
3Configuration changes (feature flags, env vars)Ad-hocHIGH
4Infrastructure changes (IaC, K8s, Terraform)Cloud deployment scriptsMEDIUM
5Database/schema changes (migrations)Django migrationsLOW
6AI/ML model changes (prompts, agent configs, model selection)Agent versioningHIGH
7Framework component changes (skills, agents, hooks, commands)ADR-049 lifecycleMEDIUM
8Customer-facing API changes (versioning, deprecation)Planned (N track)HIGH
9Documentation changes (docs-as-code)PR reviewLOW
10Security changes (patches, vulnerability remediation)Security scanningMEDIUM
11Organizational process changes (workflows, policies)Session logsHIGH
12Registry/metadata changes (component-counts, activation status)Auto-hooksLOW

3. Standards Matrix

3.1 NIST Standards

NIST SP 800-128 — Guide for Security-Focused Configuration Management

  • Version: Update 1 (October 2019)
  • Scope: Security-focused configuration management (SecCM) for information systems
  • Key Requirements:
    • CM Planning: Establish CM policies, procedures, and responsibilities
    • Configuration Identification: Baseline configurations for all system components
    • Configuration Change Control: Formal process for requesting, evaluating, approving changes
    • Configuration Status Accounting: Record and report current configuration status
    • Configuration Verification and Audit: Verify actual matches approved baseline
  • CODITECT Mapping:
    • CM Planning: CLAUDE.md directives + ADR governance
    • Identification: component-counts.json, framework-registry.json, component-activation-status.json
    • Change Control: Git PR workflow + ADR approval gates (ADR-175 Step 7)
    • Status Accounting: Session logs, trajectory dashboard, /cxq --stats
    • Verification: Hooks (task-id-validator, component-indexer), MoE judges
  • Gap: No formal CM Plan document; SecCM roles not explicitly defined

NIST SP 800-53 Rev 5 — Security and Privacy Controls (CM Family)

  • Version: Revision 5, Update 1 (December 2024)
  • Key Controls:
    ControlTitleCODITECT Status
    CM-1Policy and ProceduresPartial (CLAUDE.md, ADRs)
    CM-2Baseline ConfigurationYes (registries, component-counts)
    CM-3Configuration Change ControlPartial (Git + ADR-175 for migration)
    CM-4Impact AnalysesYes (MCP impact analysis tool)
    CM-5Access Restrictions for ChangePartial (Git branch protection)
    CM-6Configuration SettingsPartial (env vars, no centralized)
    CM-7Least FunctionalityNot addressed
    CM-8System Component InventoryYes (component-indexer, platform.db)
    CM-9Configuration Management PlanNot formalized
    CM-10Software Usage RestrictionsNot addressed
    CM-11User-installed SoftwareN/A (SaaS)
    CM-12Information LocationPartial (ADR-118 databases)
    CM-13Data Action MappingNot addressed
    CM-14Signed ComponentsPlanned (code-signing-specialist agent)
  • Key Enhancements for CM-3:
    • CM-3(1): Automated Documentation, Notification, and Prohibition of Changes
    • CM-3(2): Testing, Validation, and Documentation of Changes
    • CM-3(4): Automated Security Response
    • CM-3(5): Automated Change Implementation
    • CM-3(6): Cryptography Management
    • CM-3(7): Review System Changes
    • CM-3(8): Prevent or Restrict Configuration Changes

NIST CSF 2.0 — Cybersecurity Framework (February 2024)

  • Version: 2.0 (Released February 26, 2024)
  • Key change management categories:
    • GV (Govern): New core function — elevates cybersecurity to strategic enterprise risk
    • GV.OC: Organizational Context — understand change management context
    • GV.RM: Risk Management Strategy — change risk assessment
    • GV.RR: Roles, Responsibilities, and Authorities — change approval authorities
    • PR.IP: Information Protection Processes — configuration change control
    • PR.DS: Data Security — protect integrity of data during changes
    • ID.AM: Asset Management — maintain inventory through changes
    • RC.RP: Recovery Planning — rollback capabilities
  • CODITECT Gap: GOVERN function not fully mapped; need explicit cyber governance for changes

NIST SP 800-37 Rev 2 — Risk Management Framework

  • Version: Revision 2 (December 2018)
  • Change Management Integration:
    • Prepare Step: Establish organizational context for change management
    • Monitor Step: Continuous monitoring of system changes including:
      • Assessing control effectiveness after changes
      • Documenting changes to system or environment
      • Conducting risk assessments and impact analyses
      • Reporting security/privacy status
  • CODITECT Mapping: Impact analysis MCP tools align; need formal RMF integration

NIST AI RMF 1.0 — AI Risk Management Framework

  • Version: 1.0 (January 2023) + Generative AI Profile (NIST-AI-600-1, July 2024)
  • 2025 Updates: Continuous improvement cycle, not compliance checkbox
  • Key Requirements for AI Change Management:
    • GOVERN: AI governance structures, policies, processes for change
    • MAP: Context and dependencies mapping before changes
    • MEASURE: Metrics for AI system changes (drift, performance)
    • MANAGE: Risk treatment for AI changes, including rollback
    • Model provenance and data integrity tracking
    • Third-party model assessment for external AI components
    • Continuous monitoring (AI systems evolve post-deployment)
  • CODITECT Gap: No formal AI change management process; agent/prompt changes unversioned; model selection changes not tracked

NIST SP 800-204C/D — DevSecOps for Microservices

  • Relevance: CI/CD pipeline change management, supply chain security
  • Key guidance: Integration of security into delivery pipelines, change verification

NIST SP 800-218r1 (SSDF v1.2) — Secure Software Development Framework

  • Status: Initial Public Draft (December 2025), comments through January 2026
  • Key update: Emphasis on continuous, provable secure development practices
  • Relevance: Change management for secure development lifecycle

3.2 ISO Standards

ISO 10007:2017 — Quality Management: Guidelines for Configuration Management

  • 5 Activities: Planning, Identification, Change Control, Status Accounting, Verification/Audit
  • CODITECT Alignment (from ADR-175):
    ActivityADR-175 Implementation
    PlanningWorkflow definition (component-migration.yaml)
    IdentificationComponent discovery (Step 2), manifest (Step 3)
    Change ControlApproval gates (Steps 4, 7, 11)
    Status AccountingRegistry updates (Step 8), audit log (Step 10)
    Verification/AuditVerification (Step 9), completion report (Step 12)
  • Gap: Only applied to component migration; needs extension to all change types

ISO/IEC 20000-1:2018 — IT Service Management

  • Change Management Process Requirements:
    • Documented change management policy
    • Change classification and assessment
    • Approval authorities defined
    • Change scheduling and coordination
    • Post-implementation review
    • Emergency change procedures
  • CODITECT Gap: No formal change management policy document; no emergency change procedures

ISO 27001:2022 — Information Security Management Systems

  • Annex A Controls:
    • A.8.32 Change management: Changes to information processing facilities and systems shall be subject to change management procedures
    • A.5.22 Monitoring, review and change management of supplier services: Changes to supplier services shall be managed
    • A.8.9 Configuration management: Configurations including security configurations shall be established, documented, implemented, monitored and reviewed
  • CODITECT Gap: No formal ISMS change management procedure

ISO 9001:2015 — Quality Management Systems

  • Clause 6.3 (Planning of Changes): Changes shall be carried out in a planned manner, considering: purpose, consequences, integrity, availability of resources, allocation of responsibilities
  • CODITECT Mapping: Track-based planning (ADR-116) partially addresses this

ISO/IEC 27002:2022 — Information Security Controls

  • 8.32 Change Management: Detailed guidance on implementing change management controls
    • Policy and procedures for change management
    • Change impact assessment
    • Risk assessment for changes
    • Formal approval process
    • Communication of changes to stakeholders
    • Rollback procedures
    • Documentation and audit trails

ISO 42001 — AI Management System Standard

  • Published: 2023
  • Change Management for AI:
    • Lifecycle management for AI systems
    • Impact assessment for AI changes
    • Documentation of AI system changes
    • Monitoring and reviewing AI system performance
    • Risk treatment for AI-specific risks
  • CODITECT Gap: No AI-specific change management; critical for a platform with 150+ AI agents

ISO/IEC 12207:2017 — Software Lifecycle Processes

  • Configuration Management Process:
    • Configuration item identification
    • Configuration control (change management)
    • Configuration status accounting
    • Configuration evaluation
    • Release management
  • Overlap with ISO 10007: Strong alignment but software-specific

3.3 ITIL v4 Practices

Change Enablement (formerly Change Management)

  • Purpose: Maximize successful IT changes while managing risk
  • Change Types:
    TypeRisk LevelApprovalCODITECT Mapping
    StandardLow, pre-authorizedPre-approvedComponent updates, doc changes
    NormalMedium, requires assessmentCAB or delegatedInfrastructure changes, API changes
    EmergencyHigh, urgentECAB (expedited)Security patches, production fixes
  • Key Concepts:
    • Change Authority: Who approves what level of change
    • Change Schedule: Planned change windows
    • Change Model: Repeatable steps for standard changes
    • Post-Implementation Review (PIR)
  • CODITECT Gap: No change classification model; no defined change authorities; no formal PIR process

Release Management

  • Purpose: Plan, schedule, control deployment of changes
  • CODITECT Mapping: Bottom-up commit workflow (ADR-175), but only for migrations

Service Configuration Management

  • Purpose: Maintain accurate configuration information
  • CODITECT Mapping: platform.db, framework-registry.json, component-activation-status.json

Deployment Management

  • Purpose: Move new or changed components to live environments
  • CODITECT Mapping: Cloud deployment (coditect-cloud-infra), submodule sync

3.4 Additional Frameworks

COBIT 2019

  • BAI06 (Manage Changes): Formal change management process, impact assessment, authorization, implementation, testing, post-implementation review
  • BAI07 (Manage Change Acceptance and Transitioning): Acceptance testing, release management, go-live support

TOGAF — Architecture Change Management

  • Simplicity of change: Standard changes for isolated items; incremental for existing architecture; re-architecting for transformational changes
  • CODITECT Mapping: ADR process serves as architecture change management

SAFe — Change Management in Scaled Agile

  • Continuous delivery pipeline: Build → test → stage → deploy
  • Feature toggles as change management
  • Inspect & Adapt events for process changes

3.5 Regulatory Requirements

RegulationChange Management RequirementCODITECT Relevance
SOC 2 Type IICC6.1, CC8.1: Change management controls, testing, approvalCustomer-facing compliance
FedRAMPCM controls from NIST 800-53 (CM-1 through CM-14)Federal customers
HIPAA164.312(e): Technical safeguards for changes to ePHI systemsHealthcare customers
PCI DSS v4.0Requirement 6: Change management for payment systemsPayment-handling customers
GDPRArticle 25: Data protection by design during changesEU customers/operations
SOXIT general controls: Change management for financial systemsPublic company customers
ISO 27001Annex A.8.32: CM proceduresCertification-seeking customers

4. Existing CODITECT ADR Coverage Map

4.1 ADRs with Change Management Relevance

ADRTitleChange Types CoveredStandards ReferencedGap
ADR-175Component Migration ProcessComponent relocationISO 10007, NIST 800-128, NIST CSF 2.0, ITIL v4Only migration; no other change types
ADR-049Component Creation LifecycleComponent creation, registration, activationNone explicitlyNo change/update lifecycle; only creation
ADR-119Lowercase Naming MigrationNaming convention changesNoneOne-time migration, not reusable process
ADR-054Track NomenclatureTask tracking changesNoneTracks changes but doesn't govern them
ADR-116Track-Based Plan ArchitecturePlanning changesNonePlan structure, not change control
ADR-118Four-Tier Database ArchitectureDatabase schema changesNoneArchitecture, not change process
ADR-160Inter-Session MessagingSession coordinationNoneCommunication, not change governance
ADR-161Component QA FrameworkQuality changesNoneQuality gates, not change authorization
ADR-162Progressive Component DisclosureVisibility changesNoneProgressive access, not change control
ADR-173Structured Inter-Session Message SchemaConflict detection (change coordination)NoneDetects conflicts but doesn't prevent them
ADR-047Platform FoundationPlatform architecture changesNoneFoundation, not change process
ADR-146Unified Task ID StrategyTask trackingNoneIdentification only

4.2 Existing Components

ComponentTypeChange Management Role
agents/change-management.mdAgentThin stub; ITIL change management for IT
skills/implementing-compliance/SKILL.mdSkillSOC2/GDPR/HIPAA compliance implementation
hooks/task-id-validator.pyHookEnforces task ID on all changes
hooks/component-indexer-hook.pyHookAuto-indexes after component changes
scripts/component-migration.pyScriptADR-175 migration engine
workflows/component-migration.yamlWorkflowADR-175 migration workflow
MCP impact-analysis toolsMCPChange impact analysis
MCP call-graph toolsMCPBlast radius for code changes

5. Gap Analysis Summary

5.1 Critical Gaps (Must address in ADR-176)

GapImpactStandard Requiring It
No unified change management policyCannot demonstrate complianceISO 20000, ISO 27001, SOC 2, NIST CM-1
No change classification modelAll changes treated equallyITIL v4, ISO 20000
No defined change authoritiesUnclear who approves whatITIL v4, NIST CM-5, ISO 27001 A.8.32
No AI/ML change managementAgent/model changes ungoveernedISO 42001, NIST AI RMF
No emergency change procedureEmergency changes uncontrolledITIL v4, ISO 20000
No configuration change tracking (feature flags, env vars)Config drift undetectableNIST CM-6, ISO 27002 8.32
No formal CM PlanCannot demonstrate CM programNIST CM-9, ISO 10007
No post-implementation reviewNo learning from changesITIL v4, COBIT BAI06

5.2 Medium Gaps

GapImpactStandard Requiring It
No change scheduling/windowsChanges at any timeITIL v4
No change failure rate trackingNo DORA metricIndustry best practice
No customer-facing change notificationCustomers surprised by changesISO 20000, SLA
No rollback verificationRollback may not workNIST CSF RC.RP
Infrastructure change not governedIaC changes ad-hocNIST CM-3, SOC 2

5.3 What's Already Strong

CapabilityStandard Alignment
Component inventory (platform.db)NIST CM-8, ISO 10007
Audit trail (session logs, commit history)NIST CM-3, ISO 27001
Impact analysis (MCP tools)NIST CM-4
Baseline configuration (registries)NIST CM-2
Component migration process (ADR-175)ISO 10007, NIST 800-128, ITIL v4
Task tracking (track nomenclature)NIST CM-3 documentation

6. Recommendations for ADR-176

6.1 Scope

ADR-176 should establish a Comprehensive Change Management Framework that:

  1. Defines change types and classification model (Standard/Normal/Emergency per ITIL)
  2. Maps change authorities for each type and risk level
  3. Establishes change process for each of the 12 change types
  4. Provides AI/ML-specific change management (ISO 42001, NIST AI RMF)
  5. Enables CODITECT to offer change management as a customer capability
  6. Creates compliance mappings customers can reference for their audits

6.2 Architecture Decision

Decision: Adopt ITIL v4 Change Enablement as the primary model, enriched with NIST 800-53 CM controls and ISO 10007 configuration management activities.

Rationale:

  • ITIL v4 provides the most practical classification model (Standard/Normal/Emergency)
  • NIST 800-53 provides the most comprehensive control set (CM-1 through CM-14)
  • ISO 10007 provides the 5-activity framework ADR-175 already aligns with
  • This combination covers regulatory requirements (SOC 2, FedRAMP, ISO 27001)

6.3 Change Classification Model

ClassificationRiskExamplesApprovalCODITECT Implementation
StandardPre-assessed, low riskDoc updates, component metadata, style changesAuto-approved via hooksExisting hook system
NormalMedium, needs assessmentFeature PRs, infrastructure changes, new agents, API changesPR review + designated approverGit PR + ADR if architectural
MajorHigh, cross-system impactDatabase migrations, breaking API changes, framework changesADR + human approvalADR process + approval gate
EmergencyCritical, time-sensitiveSecurity patches, production fixes, data breach responseFast-track with post-reviewNew: Emergency Change Process
AI/MLVariable, requires AI-specific assessmentModel changes, prompt engineering, agent behavior changesAI Change Board reviewNew: AI Change Assessment

6.4 Customer-Facing Capabilities

CODITECT should provide customers with:

  1. Change Management Workflow Engine — Configurable approval workflows per change type
  2. Change Impact Analysis — Leveraging MCP tools for customer codebases
  3. Compliance Evidence Collection — Auto-generated audit trails for SOC 2, ISO 27001
  4. Change Calendar — Visibility into planned changes
  5. Change Analytics — DORA metrics (change failure rate, lead time, deployment frequency)

7. Standards Cross-Reference Matrix

RequirementNIST 800-53NIST 800-128NIST CSF 2.0ISO 10007ISO 27001ITIL v4SOC 2
Change policyCM-1SecCM PlanGV.POPlanningA.5.1PolicyCC1.1
Baseline configCM-2BaselinePR.IPIdentificationA.8.9SCMCC6.1
Change controlCM-3Change ControlPR.IPChange ControlA.8.32Change EnablementCC8.1
Impact analysisCM-4-ID.RA-A.8.32Change assessmentCC3.2
Access restrictionCM-5-PR.AC-A.8.3-CC6.1
Config settingsCM-6-PR.IP-A.8.9SCMCC6.1
Component inventoryCM-8-ID.AMIdentificationA.5.9SCMCC6.1
CM PlanCM-9SecCM PlanGV.POPlanningA.5.1-CC1.1
Signed componentsCM-14-PR.DS---CC6.1
Status accounting-Status Acct.-Status Acct.-SCM-
Verification/audit-Verify/AuditDE.CMVerify/AuditA.8.34-CC4.1
Emergency changes--RS.RP--EmergencyCC8.1
Post-review-----PIRCC4.1

8. Sources

NIST Publications

ISO Standards

  • ISO 10007:2017 — Quality Management: Configuration Management Guidelines
  • ISO/IEC 20000-1:2018 — IT Service Management
  • ISO 27001:2022 — Information Security Management Systems
  • ISO/IEC 27002:2022 — Information Security Controls
  • ISO 9001:2015 — Quality Management Systems
  • ISO 42001:2023 — AI Management System
  • ISO/IEC 12207:2017 — Software Lifecycle Processes

ITIL and Industry

  • ITIL v4 Foundation — Change Enablement Practice
  • COBIT 2019 — BAI06 Manage Changes, BAI07 Manage Change Acceptance
  • TOGAF — Architecture Change Management

Regulatory

  • SOC 2 Type II — Trust Services Criteria (CC6.1, CC8.1)
  • FedRAMP — NIST 800-53 CM controls overlay
  • PCI DSS v4.0 — Requirement 6
  • HIPAA — 164.312(e) Technical Safeguards
  • GDPR — Article 25 Data Protection by Design

Analysis Document: change-management-standards-analysis-2026-02-11.md Full Path: internal/analysis/change-management/change-management-standards-analysis-2026-02-11.md Next Step: ADR-176 — Comprehensive Change Management Framework