Skip to content

SOC Change Management SOP

Document ID: CHG-001
Version: 1.0
Last Updated: 2026-02-15
Owner: SOC Manager


Purpose

Defines the process for making changes to SOC tools, detection rules, playbooks, and infrastructure. Ensures changes are reviewed, tested, approved, and documented before deployment.


Scope

This SOP covers changes to: - Detection rules (Sigma, YARA, custom SIEM rules) - Playbooks and response procedures - SIEM configuration (parsers, dashboards, alerts) - EDR policies and exclusions - Firewall rules managed by SOC - SOAR workflows - TI feed configuration - SOC tooling (upgrades, patches, new tools)


Change Categories

Category Risk Approval Lead Time Examples
Standard Low SOC Lead 1 day New Sigma rule, whitelist entry, dashboard update
Normal Medium SOC Manager 3 days SIEM parser change, new log source, playbook update
Emergency High SOC Manager + CISO Immediate Critical vulnerability patch, active incident response
Major High CAB (Change Advisory Board) 5+ days SIEM upgrade, new tool deployment, architecture change

Change Process

graph TD
    Request[1. Submit Change Request] --> Review[2. Technical Review]
    Review --> Test[3. Test in Staging]
    Test --> Approve[4. Approval]
    Approve --> Deploy[5. Deploy to Production]
    Deploy --> Verify[6. Post-Deploy Verification]
    Verify --> Close[7. Close & Document]

    Test -->|Failed| Fix[Fix Issues]
    Fix --> Test
    Verify -->|Issues| Rollback[Rollback]
    Rollback --> Fix

Step 1: Submit Change Request

Use the Change Request Template and include:

Field Required Description
Change title Clear summary of the change
Category Standard / Normal / Emergency / Major
Requester Who is requesting
Justification Why is this change needed?
Impact assessment What could go wrong? Affected systems?
Rollback plan How to undo if it fails
Test plan How will you verify success?
Target date When to deploy

Step 2: Technical Review

The assigned reviewer must verify: - [ ] Change is technically sound - [ ] No conflicts with existing rules/configs - [ ] Rollback plan is viable - [ ] Impact assessment is accurate

Step 3: Test in Staging

Detection Rules:

# Validate Sigma rule syntax
python tools/sigma_validator.py rules/new_rule.yml

# Test against sample logs
sigmac -t splunk new_rule.yml | splunk search

# Verify no excessive false positives (run against 7 days of data)

Playbook Changes: - Walk through with a peer (tabletop) - Verify all referenced tools/contacts are accurate

SIEM Changes: - Test in dev/staging SIEM instance - Verify log parsing is correct - Check performance impact

Step 4: Approval

Category Approver Method
Standard SOC Lead Slack/Teams approval
Normal SOC Manager Ticket approval
Emergency SOC Manager + CISO Phone/verbal (document after)
Major CAB Meeting + formal sign-off

Step 5: Deploy to Production

  • Deploy during maintenance window (if applicable)
  • Use version control (git) for all rule/playbook changes
  • Tag the deployment in git: git tag -a v1.x -m "CHG-XXX: description"

Step 6: Post-Deploy Verification

Within 24 hours of deployment: - [ ] Change is functioning as expected - [ ] No unexpected alerts or errors - [ ] No performance degradation - [ ] Relevant team members notified

Step 7: Close & Document

  • Update change ticket with results
  • Update relevant documentation
  • Close the change request

Emergency Change Process

⚡ Emergency changes bypass normal lead time but MUST:
   1. Be verbally approved by SOC Manager (or CISO if unavailable)
   2. Be documented WITHIN 24 HOURS after deployment
   3. Be reviewed in the next weekly SOC standup
   4. Have a rollback plan (even if informal)

Change Log Template

Date Change ID Description Category Deployed By Status
2026-02-15 CHG-001 Add Sigma rule for DNS tunneling Standard @analyst1
2026-02-14 CHG-002 Update PB-01 Phishing playbook Normal @soc_lead

Emergency Change Process

For changes required during active incidents:

graph TD
    Incident["Active Incident"] --> Need["Change Needed<br/>for Containment"]
    Need --> Verbal["Verbal Approval<br/>from SOC Manager"]
    Verbal --> Execute["Execute Change"]
    Execute --> Document["Document<br/>Retroactively (24h)"]
    Document --> Review["Review in<br/>Post-Incident"]

Emergency Change Rules

  1. Verbal approval from SOC Manager or CISO is sufficient
  2. Document within 24 hours after the incident is stabilized
  3. No testing required if containment is urgent
  4. Rollback plan must still be identified before execution
  5. Post-incident review must evaluate whether the change should be permanent

Post-Implementation Review Template

Field Details
RFC ID RFC-XXXX
Change Description [What was changed]
Implementation Date YYYY-MM-DD HH:MM
Implemented By [Name]
Status ✅ Success / ⚠️ Partial / ❌ Failed
Actual Downtime [Duration vs. planned]
Issues Encountered [Any problems during change]
Rollback Required? Yes/No
Validation Results [All checks pass?]
Follow-up Actions [Next steps if any]