Skip to content

Request for Change (RFC)

Instructions: Complete all sections before submitting to the Change Advisory Board (CAB). Emergency changes may skip CAB but require SOC Manager + CISO verbal approval and retrospective review within 48 hours.


Field Value
RFC ID #RFC-YYYYMMDD-XX
Requester [Name / Role]
Date Submitted YYYY-MM-DD
Target Date YYYY-MM-DD
Change Type ☐ Standard · ☐ Normal · ☐ Emergency
Priority ☐ Critical · ☐ High · ☐ Medium · ☐ Low
Environment ☐ Production · ☐ Staging · ☐ Development

1. Description of Change

What exactly is being changed? Be specific about components, versions, and configurations.

Aspect Details
Component [SIEM / EDR / SOAR / Network / Other]
Change Summary [e.g., Deploy new detection rule 'Detect Mimikatz T1003']
Scope [Which systems/tenants/regions affected]
Version From: [current] → To: [target]

2. Justification

Why is this change necessary? What risk does it mitigate?

Question Answer
Business Need
Risk Mitigated
Consequences of NOT Changing
Regulatory Requirement? ☐ Yes (specify) · ☐ No

3. Impact Analysis

Dimension Assessment
Affected Components [List all systems]
Affected Teams [SOC / IT Ops / Network / Users]
Risk of Failure ☐ Low · ☐ Medium · ☐ High
Downtime Required ☐ Yes (duration: ____) · ☐ No
Performance Impact ☐ None · ☐ Temporary degradation · ☐ Significant
False Positive Risk ☐ Low · ☐ Medium · ☐ High (for detection rules)
User Notification Needed ☐ Yes · ☐ No

4. Implementation Plan

# Step Responsible Duration Checkpoint
1 Pre-change backup/snapshot
2 [Implementation step]
3 [Implementation step]
4 Post-change validation
5 Monitoring period

Maintenance Window: YYYY-MM-DD HH:MM – HH:MM (UTC)


5. Testing & Validation

Test Expected Result Actual Result Pass?
Functional test
Performance test
Alert validation (if detection rule)
No regression on existing rules

6. Rollback Plan

Step-by-step instructions to revert the change if it fails.

# Rollback Step Responsible Duration
1
2
3 Verify rollback successful

Rollback Trigger: [What conditions trigger a rollback?] Maximum Acceptable Downtime: [Duration]


7. Communication Plan

When Who Channel Message
Before change [Affected teams] [Email/Chat] Planned change notification
During change [SOC team] [Chat] Status updates
After change [All stakeholders] [Email] Completion confirmation
If failed [Management] [Phone + Email] Rollback notification

8. Approval (CAB)

Role Name Decision Date
SOC Manager ☐ Approved · ☐ Rejected
IT Operations ☐ Approved · ☐ Rejected
Security Lead ☐ Approved · ☐ Rejected
CISO (Critical only) ☐ Approved · ☐ Rejected

CAB Decision: ☐ Approved · ☐ Approved with Conditions · ☐ Deferred · ☐ Rejected

Conditions (if any):


9. Post-Implementation Review

Metric Value
Change Successful? ☐ Yes · ☐ Partial · ☐ No (rolled back)
Actual Implementation Time
Issues Encountered
Lessons Learned
Follow-up Actions

Risk Assessment Matrix

Risk Factor Low (1) Medium (2) High (3)
Scope Single rule/dashboard Multiple tools/configs Core infrastructure
Reversibility Instant rollback Rollback < 1 hour Rollback > 1 hour or destructive
Impact if Failed Minor inconvenience Alert gaps (< 1 hour) Monitoring blindspot or data loss
Testing Fully tested in lab Partially tested Cannot test in advance
Timing During change window During business hours During active incident

Risk Score = Sum of all factors (5-15) - 5-7: Low risk → SOC Lead approval - 8-10: Medium risk → SOC Manager approval - 11-15: High risk → CISO approval + CAB review

Approval Matrix

Change Type Risk Level Approver Lead Time
New detection rule (test mode) Low SOC Lead Same day
Detection rule to production Low-Medium SOC Lead + peer review 24 hours
SIEM configuration Medium SOC Manager 48 hours
New log source onboarding Medium SOC Manager 1 week
Agent deployment (fleet-wide) High SOC Manager + IT Lead 1 week
Major platform upgrade High CISO + CAB 2 weeks
Tool replacement/migration High CISO + Board 1 month

Post-Change Validation Checklist

□ Change applied successfully
□ No error messages in logs
□ System health dashboards normal
□ Test alert fires correctly (if rule change)
□ Data flow confirmed (if source/pipeline change)
□ No unexpected FP increase
□ Performance baseline unchanged
□ Rollback plan confirmed working
□ Change ticket updated and closed
□ Team notified of change completion

References