Chapter 3: Risk Assessment and Impact Analysis
The depth of risk analysis in change management varies significantly based on an organization’s risk tolerance and maturity. Highly risk-averse companies may require detailed assessments that analyze the potential impact of a change, its duration, and any associated risks. On the other hand, less structured organizations often adopt a more informal approach, discussing risks and impacts at a broader level without diving into granular details.
In the early stages of risk assessment, particularly during asset management and change management, organizations often conduct top-level analyses. This process involves broadly identifying potential risks and benefits associated with a change. As the process progresses, the focus narrows, zooming in on specific assets, configurations, and scenarios.
The key question becomes: What is the risk of making this change versus not making it?

Assessing Security and Compliance Risks
Cybersecurity teams play a critical role in evaluating how proposed changes impact security and compliance requirements. Changes that compromise confidentiality, integrity, or availability (CIA) must be carefully examined. For example:
- Impact on compliance: Could the change result in non-compliance with regulatory standards, requiring adjustments to the organization’s security posture?
- Client infrastructure: Will this change introduce new risks to the client’s systems or processes?
Tools for Detecting Unauthorized Changes
Detecting and preventing unauthorized changes is a key element of managing risk. Tools that monitor IT environments for unexpected modifications provide vital insight into unapproved changes that could compromise security.
For instance, a global administrator making configuration changes to Microsoft 365 settings without approval might inadvertently disable critical functions like Multi-Factor Authentication (MFA), causing disruptions across the organization. Proper tools can flag these actions for review, ensuring they don’t escalate into larger issues.
Practical Insights from Change Management Scenarios
- Granularity of risk assessment: When an organization evaluates a system update, it must consider not only the direct impact of the change but also any cascading effects it might have on interconnected systems or workflows.
- Planned vs. unplanned changes: Distinguishing between these is essential. Planned changes involve approvals, testing, and monitoring, whereas unplanned changes (such as emergencies or unauthorized modifications) can introduce significant risks.
- Balancing risks and benefits: A proposed update might improve functionality but introduce a period of vulnerability or downtime. Cybersecurity teams must provide the CAB with a clear understanding of these trade-offs to facilitate informed decision-making.
Effective change management relies on embedding a structured risk assessment process at every stage. From the initial top-level analysis to detailed evaluations of configurations and security implications, this approach helps organizations weigh the risks and benefits of each change.