Get the FREE Ultimate OpenClaw Setup Guide →

change-management

Scanned
npx machina-cli add skill BagelHole/DevOps-Security-Agent-Skills/change-management --openclaw
Files (1)
SKILL.md
1.5 KB

Change Management

Implement structured change management processes.

Change Process

change_workflow:
  1_request:
    - Change description
    - Risk assessment
    - Rollback plan
    - Testing evidence
    
  2_review:
    - Technical review
    - Security review
    - CAB approval (if high risk)
    
  3_schedule:
    - Change window
    - Communication
    - Resource allocation
    
  4_implement:
    - Execute change
    - Verify success
    - Update documentation
    
  5_review:
    - Post-implementation review
    - Lessons learned

Change Classification

TypeRiskApprovalExample
StandardLowPre-approvedPatching
NormalMediumManagerConfig change
EmergencyVariableExpeditedSecurity fix

Pull Request Template

## Change Description

## Risk Level
- [ ] Low - Standard change
- [ ] Medium - Normal change
- [ ] High - CAB required

## Testing
- [ ] Unit tests pass
- [ ] Integration tests pass
- [ ] Staging deployment verified

## Rollback Plan

## Stakeholders Notified
- [ ] Operations
- [ ] Security
- [ ] Business owners

Best Practices

  • Clear change categories
  • Required approvals by risk
  • Rollback procedures documented
  • Post-change verification
  • Change freeze windows

Source

git clone https://github.com/BagelHole/DevOps-Security-Agent-Skills/blob/main/compliance/governance/change-management/SKILL.mdView on GitHub

Overview

This skill enables a formal change management process for production systems. It defines a five-step workflow (request, review, schedule, implement, post-review) and classifies changes as Standard, Normal, or Emergency to determine approvals, windows, and rollback needs.

How This Skill Works

It uses a YAML-based change_workflow with five stages: 1_request, 2_review, 3_schedule, 4_implement, 5_review. The process enforces CAB approval for high-risk changes, establishes change windows, and requires a rollback plan and testing evidence in the request and PR templates, followed by a post-implementation review.

When to Use It

  • Deploying a security patch to production during a scheduled window
  • Making a production configuration change with risk assessment and approvals
  • Performing routine low-risk changes (Standard) with pre-approved procedures
  • Handling an emergency fix that requires expedited CAB approval
  • Conducting planned maintenance with stakeholder communication and rollback readiness

Quick Start

  1. Step 1: Prepare change_workflow with description, risk assessment, rollback plan, and testing evidence
  2. Step 2: Submit for review and obtain CAB approval if high risk; set change window and notify stakeholders
  3. Step 3: Implement the change, verify success, update documentation, and perform post-implementation review

Best Practices

  • Clear change categories
  • Required approvals by risk
  • Rollback procedures documented
  • Post-change verification
  • Change freeze windows

Example Use Cases

  • Patching a production server using a standard change with pre-approved rollback
  • Updating a config parameter with normal risk and CAB approval
  • Deploying a security patch during a CAB-approved change window
  • Executing an emergency security fix with expedited CAB approval
  • Documenting rollback and conducting post-change review after deployment

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers