Change Management Policy

Change Management

How changes to the WiserReview platform are planned, approved, implemented, and verified. Every deployment follows a controlled, traceable process, from routine bug fixes to emergency security patches.

Version

1.0

Effective Date

March 2026

Owner

Security Team

1. Change Classification

All changes are classified before proceeding. Classification determines the required approval level and review process. When in doubt, classify at a higher level.

ClassificationDefinitionExamples
StandardRoutine, low-risk changes with well-understood impact and proven implementation patternsBug fixes, UI changes, dependency patch updates, copy changes, performance optimizations
SignificantChanges with broader impact, new functionality, or structural modificationsNew features, API contract changes, database schema changes, new integrations, authentication changes, infrastructure configuration changes
EmergencyUrgent changes required to restore service, remediate active security vulnerabilities, or address critical incidentsP1/P2 incident hotfixes, security vulnerability patches, credential rotation due to compromise, Cloudflare WAF rule emergency updates

2. Change Request and Approval

All changes are managed through GitHub Pull Requests. This provides a complete audit trail: what changed, who approved it, and when it was deployed.

Standard Changes

PR creationDeveloper creates PR with a clear description of the change and its purpose
Code reviewAt least one other developer must review and approve the PR
MergeApproved PR merged; triggers CI/CD pipeline automatically
MonitoringPost-deployment monitoring for errors and performance regression

Significant Changes

PR creationDeveloper creates PR with detailed description: what is changing, why, what the impact is, and how it was tested
Code reviewEngineering Lead reviews and approves; security-relevant changes (auth, data access) also reviewed by Security Officer
Staging verificationChange deployed to staging environment and verified before production merge
Merge and deployApproved PR merged; CI/CD pipeline deploys to production
MonitoringExtended post-deployment monitoring; alerts watched closely for 24 hours

Emergency Changes

AuthorizationVerbal authorization from Engineering Lead (and Security Officer for P1 security incidents)
ImplementationDeveloper implements fix with focus on correctness and minimal blast radius
Expedited reviewAt minimum, a second pair of eyes reviews the change, even if abbreviated
DeployChange deployed via CI/CD pipeline (same pipeline as normal deployments)
Retroactive docsFull PR and documentation completed within 24 hours of deployment
Post-incident reviewEmergency change included in post-incident review if triggered by an incident

3. CI/CD Pipeline

All production deployments go through the GitHub Actions CI/CD pipeline. No changes are applied to production servers directly.

DeveloperGit push to feature branchGitHub Pull RequestCode review · Security checklist · Engineering Lead approvalReview requiredGitHub ActionsCI/CD triggered on merge to mainEncrypted secrets vault — no credentials in logsDocker BuildMulti-stage build · No dev deps · No source maps · No build toolsMinimal attack surfaceAzure Container RegistryAuthenticated access only · No public pulls · Version historyPrivate registryStaging DeployHealth checks · Smoke tests · Sentry baseline verificationVerified before productionProduction DeployAzure App Services · Auto-scaling · No SSH access · Health monitoredPost-Deploy MonitoringHealth endpoints · Sentry error rates · Latency monitoringAll systems greenInstant rollback — previous image

All deployments go through GitHub Actions. Credentials are stored in encrypted secrets — never in source code.

Docker Multi-Stage Builds

All Docker images use multi-stage builds to minimize the production attack surface:

  • Build stage: compiles code, installs all dependencies, runs build tools
  • Production stage: copies only runtime artifacts and production dependencies into a clean minimal base image
  • Result: production images contain no source code, build tools, source maps, test frameworks, or development packages

4. Security in the Pipeline

ControlImplementation
Secrets managementAll credentials stored in GitHub's encrypted secrets vault: never in source code, Dockerfiles, or build logs
No plaintext credentialsGitHub Actions automatically masks registered secrets in build logs
Authenticated container registryDocker images pushed to and pulled from Azure Container Registry: no public image access
Multi-stage Docker buildsProduction images contain only runtime dependencies: dev tools, test code, and build artifacts excluded
No direct production accessThe CI/CD pipeline is the only path to production: no SSH access, no manual file changes, no hotfixes outside the pipeline
Code review as security gateAll code changes reviewed before merge: a second pair of eyes on every change catches security issues before production

Security Pipeline Roadmap

  • Q3 2026: Automated dependency vulnerability scanning (npm audit, Snyk) integrated as a CI/CD gate
  • Q3 2026: Docker image vulnerability scanning before push to Azure Container Registry
  • 2027: Static application security testing (SAST) integrated into PR checks

5. Environment Separation

EnvironmentPurposeAccess
DevelopmentLocal developer machines; feature developmentIndividual developer only
StagingIntegration testing; pre-production verificationEngineering team
ProductionLive customer-facing servicesCI/CD pipeline only; no direct human access to containers
  • Production credentials are stored only in GitHub encrypted secrets vault and injected only into production deployments
  • Staging uses separate database instances with anonymized or synthetic data, not production customer data
  • Developers cannot access production database credentials directly

6. Rollback Procedures

MethodWhen to UseTime
Azure App Services deployment slot swapInstant rollback by swapping production slot to previous version~5 minutes
Redeploy previous Docker imageTrigger pipeline to deploy the previous image tag from Azure Container Registry~15–20 minutes
Full rebuild from git tagRollbacks requiring source code changes; build from previous tagged release~20–30 minutes

Database Rollback

  • MongoDB Atlas point-in-time recovery can restore data to any point within the backup window
  • Database schema changes are designed to be reversible where possible
  • For irreversible schema changes, data is backed up before migration and staged carefully through the approval process
  • Database rollback requires Security Officer authorization due to potential data implications

7. Post-Deployment Verification

CheckMethodTimeframe
Health checksAll service health-check endpoints return healthy statusImmediately after deployment
Error rate baselineSentry error rates return to pre-deployment baselineFirst 15–30 minutes
Latency monitoringAPI response times remain within normal bounds (below 5s alert threshold)First 15–30 minutes
Functional verificationEngineering Lead or developer manually verifies key user flows affected by the changeWithin 30 minutes

For Significant changes, the engineering team maintains heightened monitoring for the first 24 hours after deployment.

8. Emergency Changes

For P1 and P2 incidents where the full change management process would cause unacceptable harm, an expedited path is available.

Authorization

  • P2 incidents: Engineering Lead authorizes
  • P1 incidents (including security breaches): Security Officer authorizes

Key Constraint

Emergency changes do not bypass the CI/CD pipeline. All emergency deployments go through the same GitHub Actions pipeline as normal deployments.

Expedited Process

  1. Engineering Lead and available senior developer identify the fix
  2. Abbreviated peer review: at minimum, verbal walkthrough of the change
  3. Deploy via normal CI/CD pipeline
  4. Verify health checks and error rates immediately post-deployment
  5. Full PR documentation and post-deployment review completed within 24 hours
  6. Emergency change included in post-incident review

Change Management Inquiries

Tatvam Cloud Solutions, LLP

Email: [email protected]