ITS Change Management
Policy 14.11
| Approved by: | President |
| Responsible Officer: | Chief Information Officer |
| Responsible Office: | Information Technology Services |
| Originally Issued: | 02/09/2026 |
| Last Revision: | New |
| Category: | Technology |
Related Policies
| SD BOR 7.4 Security of Information Systems |
I. Reason for Policy
The purpose of this policy is to establish a structured and documented process for managing changes to Dakota State University’s information technology systems, infrastructure, and applications. Effective change management ensures that all modifications are evaluated, tested, approved, implemented, and reviewed in a manner that minimizes risk to the stability, integrity, and security of university operations.
This policy supports compliance with regulatory and institutional requirements, including those under FERPA, GLBA, HIPAA, and other applicable standards.
Scope. This policy applies to all individuals involved in planning, developing, testing, approving, or implementing changes that may affect DSU’s production IT systems, networks, or services. It includes employees, contractors, vendors, and third-party service providers. Changes covered under this policy include (but are not limited to):
- Hardware: Additions, removals, or modifications to computing or network equipment.
- Software: Installations, upgrades, major patches, or removals affecting production environments.
- Applications and Databases: Updates, migrations, or schema modifications impacting system integrity or data.
- Security Controls: Changes affecting authentication, authorization, encryption, or other security configurations.
- Network Components: Firewall, router, switch configurations, or topology adjustments.
- Telephony or VoIP Systems: Significant installations or relocations that affect service delivery.
II. Definitions
- Change Request (CR). A formal record in the change management system describing the proposed modification, rationale, risk, and plan.
Change Manager. The ITS role responsible for overseeing and coordinating all change management activities.
Change Owner. The individual responsible for planning, executing, and validating an approved change.
Change Review Team (CRT). The review body (CIO, Change Manager, and relevant technical representatives) responsible for reviewing and approving/rejecting changes. - CIO (Chief Information Officer). Campus Chief Information Officer/Vice President of Technology is the department head for the DSU (Dakota State University) technology department.
- Emergency Change. A high-priority change required to resolve a critical incident or prevent imminent service disruption.
- Institutional Data. Data for which institutional resources or institutionally owned, leased, licensed, or provided technology systems are used to create, manage, transmit, process, or store it, including administrative, instructional, operational, and research data. When institutional systems, devices, funding, or networks are used to create or process research data, the resulting data is considered institutional data regardless of where the researcher is physically located or which device is used at the moment of creation.
- ITS. Information Technology Services. The official technology department for Dakota State University and subsumed departments.
- Production Systems. Production systems are services, applications, infrastructure, or integrations that are in active operational use and whose disruption could materially impact university operations, users, or institutional data.
III. Statement of Policy
- All changes to DSU information systems must follow the established Change Management process.
No changes to production systems may be made without prior review, approval, and documentation through the Change Management System, except emergency changes that follow the emergency process. - Change Classification. Changes shall be categorized by risk, impact, and urgency:
- Standard Change: Pre-approved, low-risk, repeatable changes with documented procedures.
- Normal Change: Requires full assessment, approval, and scheduling through CRT.
- Emergency Change: Implemented quickly to resolve a major outage or risk; requires post-implementation review.
- Governance and Roles
- Change Requestor: Submits a CR with justification, risk, and test results.
- Change Manager: Reviews submissions, coordinates CRT review, ensures documentation, and reports metrics.
- Change Review Team (CRT): Approves, defers, or rejects proposed changes.
- Change Owner: Executes approved changes, tests, documents outcomes, and ensures closure.
- Risk and Impact Analysis. Each CR must include:
- Description of change and affected systems
- Risk and impact analysis (service disruption, security, compliance, cost)
- Testing and validation plan
- Backout or rollback procedures
- Access Control. Only authorized ITS personnel may make or approve production changes.
Change management systems and related configuration tools must enforce role-based access control. - Training and Awareness. ITS will provide training on change management procedures and expectations for all personnel involved in change processes.
- Compliance and Enforcement. Failure to follow this policy may result in disciplinary action, revocation of access privileges, or other sanctions consistent with university and Board of Regents policy.
Exclusions
The following are excluded or governed by separate processes:
- Routine operational tasks
- Individual student, faculty, or staff workstations used for coursework or daily job functions
- Installation of standard academic or productivity software on endpoint devices
- Routine operating system updates, patches, or reboots performed as part of normal device maintenance
- Common support activities such as password resets or user provisioning
- Environment changes not affecting production systems.
- Temporary failovers or maintenance on redundant systems.
- Disaster recovery activities during an actual event; however, permanent changes from recovery must follow this policy afterward.
Exceptions
Any exceptions to this policy must be formally requested, documented, and approved by the CIO. Exceptions shall be granted only in exceptional circumstances and may include additional controls or compensating measures to mitigate associated risks.
IV. Procedures (Major)
- Initiation
- The requester submits a CR in the Change Management System.
- The CR includes description, justification, affected assets, test plan, risk assessment, and rollback plan.
- Review and Approval
- The Change Manager reviews for completeness and potential conflicts.
- The CRT meets weekly (or as needed) to evaluate Normal and Major changes.
- Approval outcomes: Approved, Deferred, or Rejected.
- Communication and Scheduling
- ITS communicates approved implementation schedules to affected stakeholders.
- All changes must be scheduled outside peak operational hours when feasible.
- Testing and Implementation
- Change Owner conducts pre-deployment testing in a controlled, non-production environment.
- Upon CRT approval, the change is implemented according to the approved plan and documented in the Change Management System.
- Emergency Change Process
- Emergency changes may be authorized by the CIO or designee.
- The Change Owner must document justification, steps taken, and risks.
- The CRT must review and validate the emergency change at its next meeting.
- Post-Implementation Review and Closure
- The Change Owner confirms success or identifies issues.
- Any deviations, lessons learned, or follow-up actions are documented.
- The Change Manager updates record and officially closes the CR.
- Reporting. The Change Manager provides quarterly summaries to the CIO, including:
- Number and type of changes
- Success/failure rates
- Number of emergency changes
- Change-related incidents or rollbacks
V. Related Documents, Forms, and Tools
NIST SP 800-128 - Guide for Security-Focused Configuration Management
NIST SP 800-53 Rev 5 - Security and Privacy Controls for Information Systems and Organizations
CISA CRR Supplemental Resource Guide Vol 3
VI. Policy History
Adopted: 02/09/2026