August 30, 2023

SOC 2 Controls CC8: Change Management

The eighth SOC-2 requirements in the CC-series is Change Management.

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

CC8.1

SOC 2 CC8.1 requires that your organisation organises, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.

CC8.1 highlights the following points of focus:

Manages Changes Throughout the System Life Cycle

Your organisation should apply and use a process for managing system changes throughout the life cycle of your system and its elements, including infrastructure, data, software, and procedures. This will support system availability and processing integrity.

Authorises Changes

Your organisation should have a process in place to permit system changes before development.

Designs and Develops Changes

A process should be put in place to plan and create system changes.

Documents Changes

A process should be implemented to document system changes. This supports continuing system maintenance and assists system users in performing their responsibilities.

Tracks System Changes

A process should be put in place to track system changes before application.

Configures Software

A process should be put in place to choose and execute the configuration parameters used to manage the functionality of software.

Tests System Changes

A process should be implemented to test system changes prior to application.

Approves System Changes

A process should be put in place to authorise system changes before application.

Deploys System Changes

A process should be put in place to implement system changes.

Identifies and Evaluates System Changes

Any objectives impacted by system changes should be identified, and the modified system's ability to meet your organisation’s objectives should be assessed throughout the system development life cycle.

Detects Changes in Infrastructure, Data, Software, and Procedures Required to Resolve Incidents

Changes in infrastructure, data, software, and procedures required to remediate incidents to continue to meet your organisation’s objectives should be identified, and the change process should be initiated upon detection.

Creates Baseline Configuration of IT Technology

A standard configuration of IT and control systems should be created and preserved.

Provides for Changes Necessary in Emergency Situations

A process should be established for authorising, devising, testing, approving, and applying changes required in emergency situations (such as changes that need to be implemented within a critical time frame).

Protects Confidential Information

To meet confidentiality objectives, the organisation should safeguard confidential information during system design, development, testing, application, and change processes.

Protects Personal Information

Your organisation should protect personal information during system design, development, testing, implementation, and change processes to meet privacy objectives.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Getting Started
Computer Software
IT and Services
Growth