Change Control Procedures

PCI DSS 4.0.1 Requirement 6.5.1 requires you to run every production change through a defined change control procedure with documented business reason, security impact review, authorized approval, security testing, and a safe rollback path. For custom code, you must also verify the change meets secure coding requirements before it ships.

Key takeaways:

  • Every production change needs a ticketed trail: reason, security impact, approval, testing, and rollback steps.
  • “System components” is broad; include infrastructure, network, cloud services, configurations, and applications in scope.
  • Auditors look for consistency: your written procedure, your tooling workflow, and your evidence must match.

Change control procedures are one of the fastest ways an assessor will gauge whether your PCI program is operational or just documented. Requirement 6.5.1 is not asking for a specific tool; it’s asking for a repeatable process that prevents undocumented, untested, or unapproved production changes that could weaken security or introduce cardholder data exposure.

For a CCO or GRC lead, the operational goal is simple: make the “right way” the “easy way.” That means: a single intake path for production changes, embedded security impact prompts, explicit approvers, test evidence attached to the change record, and a rollback plan that returns the environment to a known secure state. If you have multiple engineering teams, the control must work across them without relying on tribal knowledge.

This page translates the requirement into an implementable procedure you can roll out quickly, then harden over time. It also calls out audit hangups, evidence expectations, and the common traps that cause teams to fail this requirement even when they believe they have change management “covered.”

Regulatory text

PCI DSS 4.0.1 Requirement 6.5.1 states that changes to all system components in the production environment must follow established procedures that include: the reason for and description of the change; documentation of security impact; documented change approval by authorized parties; testing to verify the change does not adversely impact system security; for bespoke and custom software changes, testing for compliance with Requirement 6.2.4 before deployment; and procedures to address failures and return to a secure state. (PCI DSS v4.0.1 Requirement 6.5.1)

Operator translation: you need one controlled pathway for production changes, and every change record must show (1) why, (2) what, (3) security impact considered, (4) approval by the right people, (5) security-relevant testing done, and (6) a rollback plan that restores security if the change fails. For custom code, you also need secure coding compliance checks before release. (PCI DSS v4.0.1 Requirement 6.5.1)

Plain-English interpretation (what the requirement means)

A compliant change control procedure makes it hard to “sneak” changes into production. It forces the organization to pause and answer:

  • What are we changing, and why?
  • Could this change reduce security (directly or indirectly)?
  • Who is authorized to accept that risk?
  • What evidence proves we tested it?
  • If it breaks, how do we get back to a secure baseline quickly?

The control fails in practice when teams treat it as paperwork after the fact. Assessors look for proof that the procedure drives behavior: timestamps, approvals before implementation, attached test results, and consistent use across in-scope production systems. (PCI DSS v4.0.1 Requirement 6.5.1)

Who it applies to (entity and operational context)

Entities: Merchants, service providers, and payment processors with PCI scope. (PCI DSS v4.0.1 Requirement 6.5.1)

Operational scope: “All system components in the production environment” is intentionally broad. In practice, include:

  • Applications that store, process, or transmit cardholder data, plus supporting services in scope
  • OS, database, middleware, and web server changes
  • Network devices, firewall rules, load balancers, WAF/CDN configuration affecting in-scope traffic
  • Cloud resources and identity/IAM changes that affect in-scope environments
  • Configuration changes (feature flags, secrets management, TLS/cipher settings, authentication flows)

If engineering tries to narrow the scope to “code deploys only,” you will miss high-risk configuration and infrastructure changes that can weaken security just as quickly. (PCI DSS v4.0.1 Requirement 6.5.1)

What you actually need to do (step-by-step)

Step 1: Define “production change” and the single intake path

Create a written procedure that defines:

  • What counts as a production change (code, config, infra, network, IAM)
  • What systems are in scope (your PCI-scoped production environment)
  • The required workflow states (submitted → security impact assessed → approved → implemented → validated → closed)

Operationalize it by forcing changes through a system of record (ticketing or change management tool). If teams can deploy without a change record, your procedure is not enforceable. (PCI DSS v4.0.1 Requirement 6.5.1)

Step 2: Standardize the required content for every change record

Your change template should require, at minimum:

  1. Reason and description (what’s changing, why now, what systems impacted). (PCI DSS v4.0.1 Requirement 6.5.1)
  2. Security impact documentation (what security controls could be affected; data flow changes; authn/authz impact; crypto/TLS impact; logging/monitoring impact). (PCI DSS v4.0.1 Requirement 6.5.1)
  3. Approval fields (named authorized approvers; evidence of approval). (PCI DSS v4.0.1 Requirement 6.5.1)
  4. Testing evidence (what was tested; results; link or attachment). (PCI DSS v4.0.1 Requirement 6.5.1)
  5. Rollback/failure procedure (steps to return to a secure state; who executes; triggers). (PCI DSS v4.0.1 Requirement 6.5.1)

Make the template short enough that engineers complete it, but strict enough that reviewers can reject incomplete requests.

Step 3: Build a security impact assessment that reviewers can execute

Avoid a generic “security reviewed: yes/no.” Instead, include structured prompts, for example:

  • Does this change modify authentication, authorization, session handling, or access controls?
  • Does it change encryption, certificates, or key management?
  • Does it change network exposure (ports, security groups, firewall rules, routes)?
  • Does it affect logging, alerting, or monitoring coverage?
  • Does it introduce a new third party service, dependency, or library in the cardholder data environment?

Document the answers in the ticket. If a change is low risk, the impact assessment should still say why. (PCI DSS v4.0.1 Requirement 6.5.1)

Step 4: Enforce “authorized approval” with clear approval authority

Define who can approve what. A workable model:

  • Technical owner approval (service owner or engineering lead)
  • Security approval for high-risk changes (identity, network exposure, crypto, logging reductions, emergency changes)
  • CAB-style approval only if it matches your operating model; don’t add ceremony that teams bypass

Approval must be documented and tied to the change record, not handled in an offline chat message. (PCI DSS v4.0.1 Requirement 6.5.1)

Step 5: Require testing that proves security is not degraded

The requirement expects testing “to verify the change does not adversely impact system security.” (PCI DSS v4.0.1 Requirement 6.5.1)
Translate that into a testing standard per change type, such as:

  • Infrastructure/network: validate firewall/security group rules; confirm management access remains restricted; confirm segmentation controls still work where applicable
  • Application: run automated test suite; run security checks relevant to the change (auth tests, input validation tests, dependency scanning outputs where relevant to your SDLC)
  • IAM: verify least privilege, break-glass controls, and logging/alerting for privileged actions

Attach evidence to the ticket (build logs, screenshots, test report links). If the evidence is elsewhere, link it in a stable way.

Step 6: For bespoke/custom software, add the “6.2.4 gate” before production

Requirement 6.5.1 explicitly requires that bespoke and custom software updates are tested for compliance with Requirement 6.2.4 before production deployment. (PCI DSS v4.0.1 Requirement 6.5.1)
Operationally, this means your release process for custom code must include a security requirements check aligned to your secure coding controls (as defined in your PCI program). Your evidence should show the check occurred before production release, not retroactively. (PCI DSS v4.0.1 Requirement 6.5.1)

Step 7: Document failure handling and “return to a secure state”

Rollback is not just “undo the deploy.” Your procedure should require:

  • A defined rollback method (previous artifact, infrastructure rollback, config revert)
  • A validation step after rollback (security controls back in place, monitoring restored, access re-validated)
  • Clear triggers (failed tests, elevated error rates, security control breakage, incident indicators)
  • Escalation path if rollback fails

Assessors will test whether your rollback steps are realistic and whether teams can execute them under pressure. (PCI DSS v4.0.1 Requirement 6.5.1)

Required evidence and artifacts to retain

Maintain evidence that shows the procedure exists and is followed consistently:

  • Written change control procedure covering all required elements. (PCI DSS v4.0.1 Requirement 6.5.1)
  • Change records for a sample of production changes showing:
    • reason/description (PCI DSS v4.0.1 Requirement 6.5.1)
    • security impact assessment completed (PCI DSS v4.0.1 Requirement 6.5.1)
    • approvals by authorized parties (PCI DSS v4.0.1 Requirement 6.5.1)
    • test results attached/linked (PCI DSS v4.0.1 Requirement 6.5.1)
    • rollback plan and outcome if invoked (PCI DSS v4.0.1 Requirement 6.5.1)
  • For custom code: evidence that each release was tested for compliance with Requirement 6.2.4 prior to production. (PCI DSS v4.0.1 Requirement 6.5.1)

Practical tip: treat the change ticket as the “audit binder page.” If evidence lives in CI/CD, vulnerability tooling, or runbooks, link it from the ticket so the record is self-contained.

Common exam/audit questions and hangups

Expect assessors to probe these areas:

  • “Show me the last set of production changes for in-scope systems and walk me through approvals and testing.” (PCI DSS v4.0.1 Requirement 6.5.1)
  • “How do you ensure emergency changes still include security impact review and a return-to-secure-state plan?” (PCI DSS v4.0.1 Requirement 6.5.1)
  • “How do you define authorized approvers, and how is that enforced in tooling?” (PCI DSS v4.0.1 Requirement 6.5.1)
  • “How do you prove security testing occurred and was reviewed before deployment?” (PCI DSS v4.0.1 Requirement 6.5.1)
  • “Which changes qualify as bespoke/custom software, and where is the evidence of the 6.2.4 compliance test?” (PCI DSS v4.0.1 Requirement 6.5.1)

Hangup: teams often provide a policy but cannot produce end-to-end evidence for real changes.

Frequent implementation mistakes (and how to avoid them)

  • Mistake: approvals happen after the change. Fix: enforce workflow gates that prevent production deployment without recorded approval. (PCI DSS v4.0.1 Requirement 6.5.1)
  • Mistake: “security impact” is a checkbox. Fix: add structured prompts and require a short narrative for “no impact.” (PCI DSS v4.0.1 Requirement 6.5.1)
  • Mistake: rollback is vague or unsafe. Fix: require a tested rollback path and a post-rollback validation checklist that confirms security controls are restored. (PCI DSS v4.0.1 Requirement 6.5.1)
  • Mistake: config and IAM changes bypass change control. Fix: treat configuration, firewall, security group, and IAM policy changes as first-class production changes. (PCI DSS v4.0.1 Requirement 6.5.1)
  • Mistake: custom code releases lack explicit 6.2.4 evidence. Fix: add a release checklist item or CI gate that outputs an artifact you can attach to the change record. (PCI DSS v4.0.1 Requirement 6.5.1)

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not list case examples.

From a risk standpoint, weak change control is a common root cause in security incidents: unauthorized changes, insecure configuration drift, and rushed fixes that reduce logging or access controls. Requirement 6.5.1 is designed to make those failure modes auditable and preventable by process. (PCI DSS v4.0.1 Requirement 6.5.1)

A practical execution plan (30/60/90-day)

Use phases rather than calendar promises; move faster or slower based on engineering maturity and tooling.

First 30 days (stabilize and make it enforceable)

  • Publish the change control procedure with the exact required elements. (PCI DSS v4.0.1 Requirement 6.5.1)
  • Implement a mandatory change template in your ticketing/change system.
  • Define “authorized approvers” by change type and document the approval matrix. (PCI DSS v4.0.1 Requirement 6.5.1)
  • Pilot with one in-scope application and one infrastructure team; fix template friction quickly.

By 60 days (expand coverage and evidence quality)

  • Extend the workflow to all PCI-scoped production systems and all change types (code, config, IAM, network). (PCI DSS v4.0.1 Requirement 6.5.1)
  • Add required testing evidence fields and minimum testing expectations per change category. (PCI DSS v4.0.1 Requirement 6.5.1)
  • Formalize emergency change handling, including retrospective review and secure rollback requirements. (PCI DSS v4.0.1 Requirement 6.5.1)
  • For custom software, implement a documented gate that produces evidence of 6.2.4 compliance checks before deployment. (PCI DSS v4.0.1 Requirement 6.5.1)

By 90 days (make it audit-ready and durable)

  • Run an internal “mock assessment”: sample recent changes and verify each has complete evidence end-to-end. (PCI DSS v4.0.1 Requirement 6.5.1)
  • Close gaps: missing approvals, missing security impact narratives, missing test artifacts, weak rollback steps. (PCI DSS v4.0.1 Requirement 6.5.1)
  • Add metrics that drive behavior (for example: changes missing required fields, emergency changes, repeated rollback events) without turning the control into bureaucracy.
  • If you manage change control evidence in multiple systems, consider using Daydream to centralize control narratives, map evidence to PCI requirements, and keep an audit-ready trail tied to each requirement without rebuilding spreadsheets each cycle. (PCI DSS v4.0.1 Requirement 6.5.1)

Frequently Asked Questions

Do we need a formal Change Advisory Board (CAB) to meet the change control procedures requirement?

PCI DSS 6.5.1 requires documented approval by authorized parties, not a CAB specifically. If a CAB slows delivery and teams bypass it, a smaller approval matrix plus enforced workflow gates often produces better compliance evidence. (PCI DSS v4.0.1 Requirement 6.5.1)

What counts as “testing to verify the change does not adversely impact system security”?

The testing must be relevant to the change and show security controls still function (access control, encryption, logging, segmentation where applicable). Attach or link test results to the change record so the evidence is reviewable. (PCI DSS v4.0.1 Requirement 6.5.1)

Are firewall rule changes and IAM policy updates included, or is this just for application releases?

They are included because the requirement applies to all system components in the production environment. Treat network, IAM, and configuration changes as production changes with the same documentation, approval, testing, and rollback expectations. (PCI DSS v4.0.1 Requirement 6.5.1)

How should we handle emergency changes without failing the requirement?

Define an emergency path that still records the reason, documents security impact, captures an authorized approval, and includes a rollback/return-to-secure-state plan. If you approve verbally during an incident, document the approval in the change record immediately after stabilization. (PCI DSS v4.0.1 Requirement 6.5.1)

What is the “return to a secure state” requirement asking for in practice?

Your failure procedure must restore security controls, not only restore uptime. Your rollback plan should include a validation checklist (for example: access controls enforced, logging restored, secure configurations re-applied) tied to the specific change. (PCI DSS v4.0.1 Requirement 6.5.1)

We use CI/CD. Is the pipeline evidence enough, or do we still need change tickets?

The requirement cares about established procedures and documented evidence of reason, impact assessment, approvals, testing, and rollback. Many teams meet this by linking CI/CD artifacts into the change record so one place tells the complete story. (PCI DSS v4.0.1 Requirement 6.5.1)

Frequently Asked Questions

Do we need a formal Change Advisory Board (CAB) to meet the change control procedures requirement?

PCI DSS 6.5.1 requires documented approval by authorized parties, not a CAB specifically. If a CAB slows delivery and teams bypass it, a smaller approval matrix plus enforced workflow gates often produces better compliance evidence. (PCI DSS v4.0.1 Requirement 6.5.1)

What counts as “testing to verify the change does not adversely impact system security”?

The testing must be relevant to the change and show security controls still function (access control, encryption, logging, segmentation where applicable). Attach or link test results to the change record so the evidence is reviewable. (PCI DSS v4.0.1 Requirement 6.5.1)

Are firewall rule changes and IAM policy updates included, or is this just for application releases?

They are included because the requirement applies to all system components in the production environment. Treat network, IAM, and configuration changes as production changes with the same documentation, approval, testing, and rollback expectations. (PCI DSS v4.0.1 Requirement 6.5.1)

How should we handle emergency changes without failing the requirement?

Define an emergency path that still records the reason, documents security impact, captures an authorized approval, and includes a rollback/return-to-secure-state plan. If you approve verbally during an incident, document the approval in the change record immediately after stabilization. (PCI DSS v4.0.1 Requirement 6.5.1)

What is the “return to a secure state” requirement asking for in practice?

Your failure procedure must restore security controls, not only restore uptime. Your rollback plan should include a validation checklist (for example: access controls enforced, logging restored, secure configurations re-applied) tied to the specific change. (PCI DSS v4.0.1 Requirement 6.5.1)

We use CI/CD. Is the pipeline evidence enough, or do we still need change tickets?

The requirement cares about established procedures and documented evidence of reason, impact assessment, approvals, testing, and rollback. Many teams meet this by linking CI/CD artifacts into the change record so one place tells the complete story. (PCI DSS v4.0.1 Requirement 6.5.1)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
PCI DSS 4.0 Change Control Procedures: Implementation Guide | Daydream