Configuration Change Control

Configuration Change Control (NIST SP 800-53 Rev 5 CM-3) requires you to define which system changes are configuration-controlled, then review and approve or reject those changes based on documented security and privacy impact analysis. To operationalize it, implement a standardized change workflow with clear change categories, required impact analysis fields, approval gates, and retained evidence for every configuration-controlled change. (NIST Special Publication 800-53 Revision 5)

Key takeaways:

  • You must pre-define what “configuration-controlled” changes include, not decide ad hoc per ticket. (NIST Special Publication 800-53 Revision 5)
  • Every controlled change needs documented security and privacy impact analysis before approval. (NIST Special Publication 800-53 Revision 5)
  • Auditors look for repeatable workflow + complete artifacts, not just a policy statement. (NIST Special Publication 800-53 Revision 5)

For a Compliance Officer, CCO, or GRC lead, “configuration change control requirement” is a practical question: which changes must go through governance, who approves them, what analysis must be documented, and what evidence survives an audit. CM-3 is not asking for perfect change management across every task; it is asking for a defensible, documented control boundary and a consistent approval process that explicitly considers security and privacy impacts. (NIST Special Publication 800-53 Revision 5)

In FedRAMP Moderate environments, the risk is rarely the existence of change. The risk is unreviewed change to security-relevant configuration: firewall rules, IAM policies, encryption settings, logging, baseline images, endpoint controls, and the pipelines that ship code and infrastructure. CM-3 forces you to prevent “silent” risk acceptance by requiring pre-defined change types and documented impact analysis as part of the approval decision. (NIST Special Publication 800-53 Revision 5)

This page gives you requirement-level implementation guidance: scope, roles, workflow gates, artifacts, and the exam questions you should be ready to answer. The goal is a process your engineering teams can actually follow and your auditors can actually test.

Regulatory text

CM-3 requires you to:

  1. Determine and document the types of changes to the system that are configuration-controlled, and
  2. Review proposed configuration-controlled changes and approve or disapprove them, with explicit consideration of security and privacy impact analyses. (NIST Special Publication 800-53 Revision 5)

Operator interpretation (plain English)

  • You must create a written, concrete definition of “configuration-controlled change types” for your system. This becomes your control boundary.
  • For any change that falls inside that boundary, you must have a repeatable review and approval workflow.
  • The approver’s decision must be informed by a documented security and privacy impact analysis (even if the conclusion is “no impact”). (NIST Special Publication 800-53 Revision 5)

Who it applies to

In scope (entity types)

  • Cloud Service Providers operating a FedRAMP Moderate service offering.
  • Federal Agencies operating or authorizing systems under FedRAMP Moderate expectations. (NIST Special Publication 800-53 Revision 5)

In scope (operational context)

CM-3 applies to the “system” boundary you define for authorization: production workloads and the supporting components that affect security and privacy posture. In practice, that includes:

  • Cloud infrastructure configuration (networks, security groups, routing, WAF, load balancers)
  • Identity and access management (roles, policies, SSO configuration, MFA requirements)
  • Cryptography settings and key management configuration
  • Logging/monitoring/audit trail configuration
  • Vulnerability management tooling configuration and scanning scope
  • Baseline images, hardened templates, and configuration profiles
  • CI/CD and Infrastructure-as-Code pipelines that can change the above (NIST Special Publication 800-53 Revision 5)

What you actually need to do (step-by-step)

Step 1: Define “configuration-controlled change types”

Create a Configuration-Controlled Change Types Register. Keep it short enough that teams can follow it, but specific enough that auditors can test it.

A practical register structure:

Change type Examples Typical risk Required approvers Required analysis
IAM / access control config New privileged role, policy update, auth method change Privilege escalation, unauthorized access Security + system owner Security + privacy impact
Network security config Firewall/WAF rule change, segmentation change Exposure of services, data path changes Security + ops Security + privacy impact
Logging/audit config Disable logs, change retention/destination Loss of detection evidence Security Security + privacy impact
Encryption/KMS config Cipher suite changes, key rotation settings Confidentiality, key compromise exposure Security Security + privacy impact
Baseline templates Gold image update, CIS profile change Drift, insecure defaults Security + ops Security + privacy impact

Your register is how you prove you “determined and documented the types of changes” that are configuration-controlled. (NIST Special Publication 800-53 Revision 5)

Step 2: Establish a single controlled workflow for those changes

You need one workflow that every controlled change can route through, even if implementation teams differ (platform, network, app, SRE).

Minimum workflow states:

  1. Request logged (ticket created; change type selected)
  2. Impact analysis completed (security + privacy fields required)
  3. Review (technical + control review)
  4. Approve / disapprove (decision recorded)
  5. Implement
  6. Validate (post-change verification)
  7. Close (evidence attached, rollback notes captured)

This can be implemented in an ITSM tool, a GRC workflow, or a pull-request based process, but it must be consistent and testable against your defined change types. (NIST Special Publication 800-53 Revision 5)

Step 3: Make impact analysis explicit and non-optional

CM-3 specifically calls for “explicit consideration for security and privacy impact analyses.” Treat this as required content in the change record, not a hallway conversation. (NIST Special Publication 800-53 Revision 5)

Add mandatory fields to the change record:

Security impact prompts

  • What security controls are affected (IAM, logging, encryption, network boundaries)?
  • Does this change increase external exposure or expand trust boundaries?
  • Does it change privilege paths or authentication requirements?
  • What is the rollback plan if security verification fails?

Privacy impact prompts

  • Does data collection, use, sharing, retention, or disclosure change?
  • Does the change introduce new data elements, identifiers, or telemetry?
  • Does access to personal data expand to new roles/systems?
  • Does logging increase capture of user content or identifiers?

Even if your org treats privacy engineering separately, CM-3 requires privacy impacts be considered as part of the approval decision for configuration-controlled changes. (NIST Special Publication 800-53 Revision 5)

Step 4: Define approver roles and decision authority

Assign approvers by change type and risk:

  • System owner/service owner: business/mission impact, outage risk
  • Information security: security impact review and approval/rejection authority for controlled changes
  • Privacy (or delegated privacy reviewer): privacy impact concurrence when applicable
  • Ops/SRE/Platform: technical feasibility and validation plan

Write an approval matrix that answers: “Who can approve what?” and “Who can never self-approve?” Auditors will test separation of duties on sensitive change types (for example, privileged access changes). (NIST Special Publication 800-53 Revision 5)

Step 5: Implement guardrails that prevent bypass

Common bypass paths:

  • Emergency fixes with no follow-up
  • Direct console changes without IaC updates
  • “Minor” tweaks to security groups or logging settings

Operational guardrails:

  • Require controlled changes to be implemented through approved pipelines where feasible (for example, Infrastructure-as-Code pull requests tied to change tickets).
  • Restrict who can make direct production config changes; log and review any break-glass actions.
  • Require post-implementation evidence and close-out checks before the ticket can close. (NIST Special Publication 800-53 Revision 5)

Step 6: Audit your own process (sampling)

Run periodic sampling of closed changes:

  • Were they correctly classified as configuration-controlled?
  • Was impact analysis completed and meaningful?
  • Did approvals occur before implementation?
  • Does the evidence match what was changed?

This is how you catch “paper compliance” where the workflow exists but teams route around it.

Required evidence and artifacts to retain

For each configuration-controlled change, retain:

  • Change record with change type classification
  • Security impact analysis (completed fields, attached docs if needed)
  • Privacy impact analysis (completed fields, attached docs if needed)
  • Approval decision (approve/disapprove) and approver identity
  • Implementation details (links to PRs, commits, pipeline runs, IaC diffs)
  • Testing/validation evidence (screenshots, logs, automated test output, control checks)
  • Rollback plan and rollback execution notes if used
  • Post-change verification results (monitoring checks, access tests, log validation)

System-level artifacts:

  • Configuration change control policy/procedure
  • Configuration-controlled change types register
  • Approval matrix / RACI
  • Exception process for emergencies, including required retrospective review documentation (NIST Special Publication 800-53 Revision 5)

Common exam/audit questions and hangups

Expect auditors to ask:

  • “Show me your documented list of configuration-controlled change types.” (NIST Special Publication 800-53 Revision 5)
  • “Pick a sample of changes from the last period. Prove each had security and privacy impact analysis before approval.” (NIST Special Publication 800-53 Revision 5)
  • “How do you prevent an engineer from changing production security groups directly?” (NIST Special Publication 800-53 Revision 5)
  • “What is your emergency change process, and how do you ensure retrospective impact analysis and approval?” (NIST Special Publication 800-53 Revision 5)
  • “How do you know changes were implemented as approved (no scope creep)?” (NIST Special Publication 800-53 Revision 5)

Hangups that trigger findings:

  • Impact analysis exists but is a blank template or single sentence for every change.
  • Approvals happen after deployment (“retroactive approvals”).
  • Change type definitions are too vague to test (“security-related changes” without examples).
  • Privacy is ignored or treated as “not applicable” without rationale. (NIST Special Publication 800-53 Revision 5)

Frequent implementation mistakes (and how to avoid them)

Mistake: Treating CM-3 as an ITIL paperwork exercise

Fix: Make the workflow lightweight for low-risk controlled changes, but non-bypassable. Use required fields and automation to reduce manual work, not more meetings. (NIST Special Publication 800-53 Revision 5)

Mistake: No clear boundary for “configuration-controlled”

Fix: Maintain a curated register of change types with examples. Update it when new services or security tooling is introduced. (NIST Special Publication 800-53 Revision 5)

Mistake: “Security reviewed” with no analysis content

Fix: Force concrete prompts and require attachments when the change is high impact (policy diffs, threat considerations, log retention impact). (NIST Special Publication 800-53 Revision 5)

Mistake: Emergency changes become a loophole

Fix: Require a post-incident change record, documented impact analysis, and formal approval within your defined governance process before closure. (NIST Special Publication 800-53 Revision 5)

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this guidance stays anchored to the control text. Operationally, weak configuration change control creates predictable failure modes: unauthorized exposure through network misconfiguration, audit/logging gaps that block investigations, and privilege misconfigurations that enable lateral movement. CM-3’s focus on explicit security and privacy impact analysis is meant to surface those risks before they reach production. (NIST Special Publication 800-53 Revision 5)

Practical 30/60/90-day execution plan

Use this phased plan to operationalize quickly without inventing arbitrary time-to-implement claims.

First 30 days (Immediate foundation)

  • Publish a CM-3 procedure: scope, controlled change types concept, required impact analysis, approval gates. (NIST Special Publication 800-53 Revision 5)
  • Build the first version of the configuration-controlled change types register with security, privacy, ops, and platform engineering.
  • Implement required fields in your ticketing or PR template: security impact, privacy impact, approver, validation plan.
  • Start capturing evidence links (PRs, pipeline runs, diffs) in change records.

By 60 days (Workflow hardening)

  • Implement an approval matrix and enforce separation of duties for sensitive change types (especially IAM and logging).
  • Stand up an emergency change process with mandatory retrospective analysis and approval.
  • Add guardrails: limit who can do direct production configuration changes; ensure such actions are logged and reviewed.
  • Run an internal sample test of closed changes and document remediation actions.

By 90 days (Operational maturity)

  • Expand the register to cover missed categories found in sampling (for example, CI/CD permission changes, monitoring pipeline changes).
  • Implement routine reporting: controlled change volumes, exception counts, overdue validations, and common failure reasons.
  • Standardize post-change validation checklists per change type (logging verified, access tested, policy diff reviewed).
  • Consider centralizing evidence collection with a workflow tool such as Daydream if your teams struggle to keep tickets, PRs, and impact analysis tied together under audit pressure.

Frequently Asked Questions

Do we have to treat every code deploy as a configuration-controlled change?

CM-3 focuses on “types of changes…that are configuration-controlled,” so you define the boundary and document it. Treat changes that affect security- or privacy-relevant configuration as controlled, and keep routine application changes outside that scope unless they alter those settings. (NIST Special Publication 800-53 Revision 5)

What counts as a “privacy impact analysis” for infrastructure changes?

For CM-3, it can be a structured check of whether data handling, access to personal data, retention, or disclosure changes. If the answer is “no,” record the rationale in the change record so the approval decision shows explicit consideration. (NIST Special Publication 800-53 Revision 5)

Can we approve changes through Git pull requests instead of ITSM tickets?

Yes, if the PR workflow captures the required elements: change type classification, documented security and privacy impact analysis, approver identity, and evidence of approval before merge/deploy. Auditors will still expect a consistent, testable trail. (NIST Special Publication 800-53 Revision 5)

How do we handle emergency changes without failing the control?

Define an emergency path that allows rapid implementation, then requires a retrospective change record with impact analysis and formal approval before closure. Treat repeated emergencies as a process failure and address root causes. (NIST Special Publication 800-53 Revision 5)

Who should be the approver for IAM and logging changes?

Assign approval to roles with security accountability, typically information security plus the system owner, and prevent self-approval by the implementer for sensitive change types. Write it down in an approval matrix and enforce it in workflow. (NIST Special Publication 800-53 Revision 5)

What is the minimum evidence set an auditor will accept?

A documented controlled-change list, plus sampled change records that show impact analysis, approval decision, implementation trace (PR/commit/pipeline), and validation/close-out evidence. Missing links between approval and what was actually deployed are a common failure point. (NIST Special Publication 800-53 Revision 5)

Frequently Asked Questions

Do we have to treat every code deploy as a configuration-controlled change?

CM-3 focuses on “types of changes…that are configuration-controlled,” so you define the boundary and document it. Treat changes that affect security- or privacy-relevant configuration as controlled, and keep routine application changes outside that scope unless they alter those settings. (NIST Special Publication 800-53 Revision 5)

What counts as a “privacy impact analysis” for infrastructure changes?

For CM-3, it can be a structured check of whether data handling, access to personal data, retention, or disclosure changes. If the answer is “no,” record the rationale in the change record so the approval decision shows explicit consideration. (NIST Special Publication 800-53 Revision 5)

Can we approve changes through Git pull requests instead of ITSM tickets?

Yes, if the PR workflow captures the required elements: change type classification, documented security and privacy impact analysis, approver identity, and evidence of approval before merge/deploy. Auditors will still expect a consistent, testable trail. (NIST Special Publication 800-53 Revision 5)

How do we handle emergency changes without failing the control?

Define an emergency path that allows rapid implementation, then requires a retrospective change record with impact analysis and formal approval before closure. Treat repeated emergencies as a process failure and address root causes. (NIST Special Publication 800-53 Revision 5)

Who should be the approver for IAM and logging changes?

Assign approval to roles with security accountability, typically information security plus the system owner, and prevent self-approval by the implementer for sensitive change types. Write it down in an approval matrix and enforce it in workflow. (NIST Special Publication 800-53 Revision 5)

What is the minimum evidence set an auditor will accept?

A documented controlled-change list, plus sampled change records that show impact analysis, approval decision, implementation trace (PR/commit/pipeline), and validation/close-out evidence. Missing links between approval and what was actually deployed are a common failure point. (NIST Special Publication 800-53 Revision 5)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
FedRAMP Moderate: Configuration Change Control | Daydream