Change Rollback Procedures

You meet the change rollback procedures requirement by having documented, approved rollback steps for IT and OT asset changes, and proving those steps are tested and usable under real operating constraints. Operationalize it by embedding rollback planning into every change ticket, validating prerequisites (backups, configs, access), and running periodic rollback tests with retained evidence. 1

Key takeaways:

  • Rollback is a required deliverable of change management for both IT and OT assets, not an ad hoc “if needed” activity. 1
  • Auditable compliance depends on two things: written procedures and proof they are tested and followed in day-to-day work. 1
  • Your hardest problems are OT constraints (safety, uptime, vendor access) and evidence quality (tickets, logs, approvals, test records).

“Change rollback procedures” sounds narrow, but it touches reliability, incident response, and operational resilience. Under C2M2 v2.1 ASSET-3.D (MIL2), you need to show that rollback procedures for changes to IT and OT assets are established and tested. 1 For a Compliance Officer or GRC lead, the quickest path is to treat rollback as a mandatory component of every production-impacting change, with a consistent format, clear ownership, and objective evidence that the organization can reverse changes safely.

This requirement often fails in two predictable ways. First, teams assume “we can always revert” without defining what “revert” means for each asset class (network, endpoints, servers, cloud, PLCs, historians, HMI/SCADA). Second, teams document a procedure but never prove it works in the environment that matters: production constraints, limited maintenance windows, privileged access controls, and third-party dependencies.

This page gives requirement-level implementation guidance you can implement quickly: scope, roles, step-by-step operating workflow, evidence to retain, audit questions, common failure modes, and a practical execution plan aligned to how real change programs run.

Regulatory text

Requirement (C2M2 v2.1 ASSET-3.D, MIL2): “Rollback procedures for changes to IT and OT assets are established and tested.” 1

What the operator must do

You must be able to demonstrate, with documentation and operating records, that:

  1. Rollback procedures exist for changes affecting in-scope IT and OT assets (documented, accessible, and governed). 1
  2. Rollback procedures are tested, meaning you can show planned, executed tests (or validated exercises) that confirm the rollback steps work and are feasible under real constraints. 1

Plain-English interpretation

For every meaningful change, you need a credible “undo” plan that a qualified person could execute quickly without improvisation. In IT, that might be reverting a config, redeploying a previous release, restoring a snapshot, or switching traffic back. In OT, rollback might mean restoring a controller program, reverting setpoints/logic, returning firmware to a validated version, or swapping to redundant equipment under a defined safe-state procedure.

“Established and tested” is the difference between:

  • A paragraph in a policy, and
  • A repeatable operational practice with evidence: change tickets include rollback steps, teams have the access and backups required, and tests show the steps actually work. 1

Who it applies to (entity and operational context)

This applies to organizations using C2M2 within a defined scope, especially energy sector and critical infrastructure operators, including environments where OT reliability and safety constraints shape how changes are executed. 1

Operationally, it applies wherever you have:

  • Production IT (identity, network, servers, endpoints, cloud, enterprise apps) that supports critical operations
  • OT environments (SCADA, DCS, PLCs, RTUs, HMIs, historians, engineering workstations)
  • Third parties who introduce or implement changes (OEMs, integrators, managed service providers), where rollback may depend on their tooling or access

What you actually need to do (step-by-step)

Step 1: Define scope and “change types that require rollback”

Create a clear scoping statement for:

  • In-scope IT asset categories
  • In-scope OT asset categories
  • Change triggers (examples: software releases, firmware upgrades, configuration changes, network rule changes, controller logic updates, patching, vendor maintenance)

Then define minimum rules:

  • Which change classes must include a rollback plan
  • When “rollback not feasible” is allowed and what compensating controls are required (for OT this is common, but it must be explicit and approved)

Deliverable: a short standard that your change process enforces. 1

Step 2: Publish a rollback procedure standard (with ownership and governance)

Write a procedure that answers, consistently:

  • Who writes the rollback plan (change owner)
  • Who approves it (change manager, system owner, OT operations, safety where applicable)
  • Where it lives (change ticket + linked runbook)
  • How often it’s reviewed and updated
  • How exceptions work (documented rationale and approval)

This aligns to the practical expectation to publish approved procedures with clear ownership, approval history, and defined personnel obligations. 1

Step 3: Embed rollback planning into the change workflow (ticket-level controls)

Update your change template so every relevant change includes:

  • Rollback decision: rollback planned vs. not feasible (with justification)
  • Rollback objective: what “restored” means (service restored, control logic returned, comms stable)
  • Pre-rollback prerequisites: backups, snapshots, exports, “golden config,” baseline versions, spare parts, maintenance window constraints
  • Rollback steps: numbered, command-level where appropriate, and specific to the asset
  • Rollback triggers: objective criteria (health checks fail, alarms, performance, unacceptable process deviation)
  • Rollback owner and access: who executes, required privileged access, MFA/break-glass steps
  • Validation after rollback: what to check and who signs off

Operator tip: require at least one independent reviewer for high-impact OT changes (operations + engineering), even if your IT CAB model is lighter.

Step 4: Make rollback executable (not theoretical)

Most rollback plans fail because prerequisites are missing. Add “readiness checks” to the change workflow:

  • Verify restore points exist and are retrievable
  • Verify you can access prior versions (packages, images, firmware, logic)
  • Verify credentials and remote access paths (including third-party access if required)
  • Verify monitoring and logging are sufficient to detect “rollback trigger” conditions

If your organization uses Daydream for GRC workflow, map these checks to required ticket fields and attachable evidence so the change cannot be marked “ready” without rollback artifacts.

Step 5: Test rollback procedures on a defined cadence and after material changes

The requirement explicitly includes testing. 1 A practical testing model:

  • Tabletop for complex OT rollbacks where live testing is unsafe, paired with evidence that backups and restore steps were validated in a non-production environment
  • Non-production execution tests (staging/QA) for IT and OT where possible
  • Production rollback drills during planned windows for selected systems where operational risk is acceptable

Testing should validate:

  • Steps are accurate and complete
  • Time and access constraints are realistic
  • Dependencies are known (third party support, license servers, hardware availability)
  • Post-rollback verification works

Step 6: Prove it’s used in day-to-day work (evidence discipline)

Retain operating artifacts that show rollback procedures are part of normal change execution, not a shelf document. 1

Minimum evidence set:

  • A sample set of recent change records with rollback sections completed
  • Approvals and reviews for the rollback plan
  • Runbooks / playbooks (version controlled)
  • Test records (date, scope, participants, results, issues, remediation)
  • Logs or screenshots showing backups/config exports created before change
  • Post-change verification and post-rollback verification results when rollback was invoked

Required evidence and artifacts to retain (audit-ready checklist)

Artifact What it proves Where it usually lives
Rollback policy/procedure with owner, approval history, review cadence “Established” and governed Policy repo / GRC system 1
Change ticket template requiring rollback fields Embedded operational requirement ITSM/change system
Completed change tickets with rollback plans Day-to-day execution ITSM/change system 1
Version history of runbooks/rollback steps Controlled documentation Git/KB/document control 1
Backup/snapshot/config export evidence Prerequisites met Backup tooling, config mgmt, attachments
Rollback tests (plans, results, remediation) “Tested” requirement met Test records / CAB minutes / attachments 1
Exception approvals for “rollback not feasible” Controlled risk acceptance Change record + risk sign-off

Common exam/audit questions and hangups

Expect auditors to probe four areas:

  1. Definition and consistency: “Show me where rollback is required, and prove teams follow it.”
    Hangup: different teams interpret “rollback” differently.

  2. OT realism: “Your OT rollback plan says ‘restore previous firmware.’ Where is the firmware image and who can deploy it?”
    Hangup: OEM dependencies and limited windows.

  3. Testing sufficiency: “What does ‘tested’ mean here? Show evidence.” 1
    Hangup: no test records, or tests exist but don’t match production configurations.

  4. Exceptions control: “How do you approve changes when rollback is not feasible?”
    Hangup: informal verbal approvals with no retained artifact.

Frequent implementation mistakes (and how to avoid them)

  1. One generic rollback procedure for everything
    Fix: keep a standard, but require system-specific runbooks linked in the ticket.

  2. Rollback plans without triggers
    Fix: define objective rollback triggers and validation checks so the decision is not subjective during an outage.

  3. Backups exist, but restores are unproven
    Fix: test restoration paths and permissions. Evidence must show retrieve-and-restore is possible, not just that backups ran.

  4. OT rollback conflicts with safety or operational constraints
    Fix: document safe-state steps and compensating controls, and route approvals to operations/safety stakeholders.

  5. Third-party change activity with no rollback accountability
    Fix: contractually require rollback documentation and evidence for third-party-performed changes, and attach it to the change record.

Enforcement context and risk implications

No public enforcement cases were provided for this specific C2M2 requirement in the supplied sources. 1 Practically, gaps show up during internal audits, customer due diligence, and incident postmortems: inability to roll back turns a routine failed change into prolonged downtime, safety exposure (OT), and reportable operational events depending on your sector obligations.

Practical 30/60/90-day execution plan

First 30 days: Stand up the minimum viable control

  • Define in-scope IT/OT asset categories and change types that require rollback plans.
  • Publish a short rollback procedure standard with named owner and approval workflow. 1
  • Update the change ticket template to require rollback steps, triggers, prerequisites, and validation checks.
  • Start collecting evidence from a small sample of new changes to confirm the workflow works.

Days 31–60: Prove “tested” with a defensible program

  • Define what counts as a rollback test for IT and for OT (execution vs. tabletop vs. lab validation).
  • Run initial rollback tests for representative systems (one or more IT services, one or more OT system types).
  • Create a remediation loop: failed tests generate action items, and runbooks get updated with version history retained. 1
  • Formalize exception handling for “rollback not feasible.”

Days 61–90: Operationalize and make it audit-ready

  • Expand to broader system coverage and include third-party-performed changes.
  • Add readiness checks (backup verification, access validation) as required steps before implementation.
  • Build an audit packet: policy, template, sample change tickets, test records, runbook version history. 1
  • If you use Daydream, configure control mapping and evidence requests so change owners attach required rollback artifacts by default.

Frequently Asked Questions

What counts as a “rollback procedure” for OT where reverting firmware or logic is risky?

A rollback procedure can be a safe-state and recovery plan that returns the process to a validated operating condition, with clear steps and approvals. If full rollback is not feasible, document the rationale, compensating controls, and explicit approval in the change record. 1

How do we prove rollback procedures are “tested” without rolling back production systems?

Use a defined testing approach that fits the asset: lab validation, staging execution, or structured tabletop with evidence that prerequisites (images, backups, access) were verified. Keep test plans and results so “tested” is demonstrable. 1

Do emergency changes need rollback plans too?

Yes, unless you formally document why rollback is not feasible and record who approved proceeding without it. Emergency does not remove the requirement to establish rollback procedures; it changes how you document and approve them. 1

What evidence do auditors usually ask for first?

They typically ask for the written procedure plus a handful of recent change tickets showing rollback steps, approvals, and any test records. If those artifacts are consistent, deeper sampling is usually smoother. 1

How should third parties be handled when they perform changes in our OT environment?

Require third parties to provide rollback steps and prerequisites as part of the change submission, and attach their evidence (backups, versions, validation) to your change record. Your organization still needs to show rollback procedures are established and tested in your environment. 1

Where do teams usually get stuck operationalizing rollback in ITSM tools?

The common failure is free-text fields with no required attachments, so teams write “rollback if needed” and move on. Fix it with mandatory fields for prerequisites, steps, triggers, and validation, plus required evidence attachments for defined change categories.

What you actually need to do

Use the cited implementation guidance when translating the requirement into day-to-day operating steps. 2

Footnotes

  1. Cybersecurity Capability Maturity Model v2.1

  2. DOE C2M2 program

Frequently Asked Questions

What counts as a “rollback procedure” for OT where reverting firmware or logic is risky?

A rollback procedure can be a safe-state and recovery plan that returns the process to a validated operating condition, with clear steps and approvals. If full rollback is not feasible, document the rationale, compensating controls, and explicit approval in the change record. (Source: Cybersecurity Capability Maturity Model v2.1)

How do we prove rollback procedures are “tested” without rolling back production systems?

Use a defined testing approach that fits the asset: lab validation, staging execution, or structured tabletop with evidence that prerequisites (images, backups, access) were verified. Keep test plans and results so “tested” is demonstrable. (Source: Cybersecurity Capability Maturity Model v2.1)

Do emergency changes need rollback plans too?

Yes, unless you formally document why rollback is not feasible and record who approved proceeding without it. Emergency does not remove the requirement to establish rollback procedures; it changes how you document and approve them. (Source: Cybersecurity Capability Maturity Model v2.1)

What evidence do auditors usually ask for first?

They typically ask for the written procedure plus a handful of recent change tickets showing rollback steps, approvals, and any test records. If those artifacts are consistent, deeper sampling is usually smoother. (Source: Cybersecurity Capability Maturity Model v2.1)

How should third parties be handled when they perform changes in our OT environment?

Require third parties to provide rollback steps and prerequisites as part of the change submission, and attach their evidence (backups, versions, validation) to your change record. Your organization still needs to show rollback procedures are established and tested in your environment. (Source: Cybersecurity Capability Maturity Model v2.1)

Where do teams usually get stuck operationalizing rollback in ITSM tools?

The common failure is free-text fields with no required attachments, so teams write “rollback if needed” and move on. Fix it with mandatory fields for prerequisites, steps, triggers, and validation, plus required evidence attachments for defined change categories.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
C2M2 Change Rollback Procedures: Implementation Guide | Daydream