Change Management for IT: Understanding IT Changes with ITSM and the ITIL® 4 Framework

Key Takeaways

  • Change management is a structured approach that aligns people, processes, and technology to help organizations transition from a current state to a desired future state, minimizing disruption and maximizing adoption.
  • Ongoing measurement, continuous feedback loops, and data-driven monitoring are essential to track progress, address issues early, and ensure sustainable, value-driven transformation.

Some 2,500 years ago, the Greek philosopher Heraclitus stated that the only constant in life is change. And that reality spans every modern IT environment today: constantly changing business and user needs, technologies, and compliance demands trigger unending upgrades and patches.

Unfortunately, changes to IT services and their underlying components come with inherent risks. How well these changes, these risks, are managed makes the difference in whether you you’re your desired outcomes, efficiently and effectively.

Defining “change” and IT change management

The ITIL® 4 service management framework defines a change as the addition, modification, or removal of anything that could have a direct or indirect effect on IT services.

IT change management is charged with maximizing the number of successful changes to IT services and their components. How? By ensuring risks have been properly assessed, authorizing changes to proceed, and managing the change schedule.

Change management has long been defined as a central or ‘core’ process to IT service management, as the VeriSM approach to service management makes clear. The Universal Service Management (USM) method lists change as one of the five non-redundant processes that include all the activities relevant to managing a service.

Let’s break down how these best practices — ITIL 4, VeriSM, and USM — advise on the best way to plan and execute IT changes to meet business outcomes.

A note on terms: change management vs. change control

Though most known as IT change management, ITIL 4 calls this practice “IT change enablement”.

Note, also, that change management can apply to many areas of a business — for example, organizational change management is very different from IT change management, the topic of this article.

Another phrase to be aware of is change control: “Change control is a procedure within change management that focuses on specific steps and activities to ensure that releases and deployments do not conflict with production components. Critical and time-sensitive platform changes, such as security patches, often lead directly to change control. As a result, change control has a higher level of risk that organizations typically accept.”

type-of-change

Categories of IT changes

When it comes do delivering IT changes requested by the business, the demands are usually:

Balancing these two requirements can be a challenge — after all, these factors are usually on the opposite sides of the risk spectrum.

For example, take a culture where bureaucracy prevails: approvals, checks, balances from various teams. Here, speed may be compromised in an attempt to limit negative effects of IT changes during the planning and approval activities.

In contrast, a high velocity organization may push for speed of execution — this may hinder the effectiveness of relevant checks and balances.

Categorizing IT changes and defining the most appropriate approach to handling each of them is one of the ways IT can try find a compromise between speed and control.

Three categories of change

There are three categories of change types according to ITIL:

By designing adaptable change models based on the change categories and risk profiles, an IT organization can significantly increase the likelihood that IT changes will be planned and executed effectively, safely, and promptly.

it-change

Activities & phases in the IT change management lifecycle

While the type of IT change has a significant bearing on the process activities, there are generally five main steps involved in the lifecycle of a change:

Phase 1. Change preparation

Before an IT team submits a change request, they usually have done some groundwork in advance. This pre-work may include:

Usually during preparation, the change team prepares a plan that includes sequenced activities, responsibilities, and timelines. The team has both an idea of the potential impact of the change as well as a rollback plan in case things go wrong.

Phase 2. Change registration

Next, the team lead or other responsible teammate submits the change request. If an ITSM ticketing system is used, a change ID is generated and the ticket gets populated with a variety of information including:

Phase 3. Change authorization

Depending on the change type and potential risk level, the change request is routed to the appropriate change authority for assessment, review and approval. The change authority may be a product team, line manager, change manager, and/or change advisory board (CAB).

Decisions on whether or how to proceed will be determined mainly by:

Phase 4. Change realization

Once a change is approved, the change is scheduled and communicated to key stakeholders. Scheduling ensures that the right resources are made available and limits the possibility of conflicts with other changes that involve the same IT components.

The change is then executed, but putting the change live isn’t the end of the change process. The change is then monitored over time, with the initial results communicated to the same stakeholders.

Phase 5. Change review

After some agreed period, the realized results of the IT change are reviewed with the stakeholders. Some of the questions to be asked include:

The feedback from the previous steps is documented and improvements incorporated in future changes. The change request ticket is linked with any related incidents or problems, and then closed.

(Related reading: the role of feedback loops & incident review best practices.)

Risks in IT change management

Change management always considers the chances that things might go wrong because of an IT change. However, always remember that the ‘risk of doing nothing’ can be worse.

Let’s look at some common risk factors for change.

Bureaucracy prevents speedy changes. IT changes are primarily driven by the need for continual improvement. However, if the change authorization process is slowed down by excessive bureaucracy —requiring too much supporting documentation, involving too many approvers — it people will be discouraged from following the correct process.

As a result, the organization's ability to innovate and implement new changes quickly is severely hindered. And you’ve likely also spawned some shadow IT that may introduce additional risk.

Environmental considerations. Change scenarios also depend on the kind of environment the IT services are hosted in. For example, legacy equipment may make it difficult to execute faster changes through automation.

Modernizing the execution of IT changes by adopting continuous integration, continuous delivery, and continuous deployment can:

Streamlining change models and approval levels through appropriate governance mechanisms can also address the risk of IT staff circumventing the laid down process.

Criticality of changes. But IT changes come with inherent risks especially where any impact to live, critical services is significant. As IT environments evolve in complexity, chances that a change can cause more harm than anticipated are higher than ever.

The CrowdStrike incident of July 2024 is a classic case where a routine configuration update went wrong — disastrously wrong. Here, a routine update resulted in over 8 million devices globally running Microsoft Windows to crash.

Managing risk in IT changes

Take that example of an important lesson learned: As part of IT change planning, teams should ensure that the IT change implementation plans include the ability to reverse or ‘fix-forward’ changes, which is tested as part of the preparation steps.

Communication is critical in aligning stakeholders especially IT service owners whose dependent systems will be impacted by the IT change.

A comprehensive configuration database (CMDB) can be an invaluable resource for change management. A well scoped and comprehensive CMDB hosts the details about:

This information can be immensely useful in planning the change, especially regarding:

Last thoughts

As more organizations take a cloud-first approach to IT services and adopt automated mechanisms for implementing of changes within their environments, the role of IT change management will continue to evolve. The focus will increasingly be on two areas:

Closer collaboration with other ITSM practices including incident, problem and configuration management will also be crucial in enabling IT teams effectively contain fallouts from changes gone wrong.

Related Articles

Knowledge Graphs: What They Are and Why They Matter
Learn
7 Minute Read

Knowledge Graphs: What They Are and Why They Matter

Knowledge graphs can make organizing and understanding information much easier. Learn how they work and what benefits they provide in this comprehensive guide.
Artificial Intelligence as a Service (AIaaS): What is Cloud AI & How Does it Work?
Learn
5 Minute Read

Artificial Intelligence as a Service (AIaaS): What is Cloud AI & How Does it Work?

Learn what Artificial Intelligence as a Service (AIaaS) and cloud AI are, including their key benefits, challenges, technology layers, and core features.
Understanding Application Lifecycle Management (ALM): Stages, Strategies, and Benefits
Learn
7 Minute Read

Understanding Application Lifecycle Management (ALM): Stages, Strategies, and Benefits

Comprehensive guide to Application Lifecycle Management (ALM): key stages, best practices, and benefits for managing software from planning to retirement.
Top AI Trends for 2026: Key Technologies and Challenges and What They Mean
Learn
5 Minute Read

Top AI Trends for 2026: Key Technologies and Challenges and What They Mean

Discover the top AI trends for 2026 — and learn how businesses can leverage these advancements, overcome new challenges, and stay ahead in a rapidly evolving landscape.
Hashing in Cryptography Explained: How It Works, Algorithms, and Real-World Uses
Learn
8 Minute Read

Hashing in Cryptography Explained: How It Works, Algorithms, and Real-World Uses

Learn what hashing in cryptography is, how it works, key algorithms like SHA-256, real-world uses, and best practices to keep your data secure.
Understanding Network Traffic & Network Congestion: Metrics, Measurement, and Optimization
Learn
8 Minute Read

Understanding Network Traffic & Network Congestion: Metrics, Measurement, and Optimization

Network traffic is critical for businesses today. Read on to learn how network traffic works, and how to stop traffic congestion.
How To Monitor Data Storage Systems: Metrics, Tools, & Best Practices
Learn
9 Minute Read

How To Monitor Data Storage Systems: Metrics, Tools, & Best Practices

Learn how to monitor data storage systems. Discover key metrics, tools, and strategies to prevent outages, reduce costs, and maintain reliable performance.
Data Enrichment Strategies: How to Enhance Your Business Data for Better Insights
Learn
5 Minute Read

Data Enrichment Strategies: How to Enhance Your Business Data for Better Insights

Unlock business growth with data enrichment. Discover key strategies, tools, and best practices to enhance data quality, drive insights, and improve decision-making.
Load Balancing in Microservices: How It Works, Algorithms, and Modern Best Practices
Learn
6 Minute Read

Load Balancing in Microservices: How It Works, Algorithms, and Modern Best Practices

Learn how load balancing works in microservices architecture: key algorithms, container-aware routing, and modern approaches for scalability, resilience, and performance.