
Overview
The Change Management module allows organizations to securely track and assess changes introduced to their applications, infrastructure, or APIs.It ensures that every new release or feature undergoes a controlled security review before production deployment. Whether you are performing internal change reviews or managing external pentest requests, this module provides a unified process for security validation, approval tracking, and evidence management.
Purpose
Every code deployment or configuration update can impact the security posture.Change Management in Snapsec VM formalizes this process by:
- Documenting change requests with relevant context (title, owner, timeline, dependencies).
- Running targeted assessments on new or modified components.
- Tracking vulnerabilities introduced or fixed through each release.
- Maintaining traceability between changes, vulnerabilities, and pentest results.
Value
Security in Every Release
Ensure each release or feature update goes through defined security checks before deployment.
Centralized Request Tracking
Manage all change and pentest requests from a single interface with clear visibility on status and priority.
Evidence-based Validation
Attach supporting evidence, testing credentials, and API documentation for validation and audit.
Seamless Integration
Link Jira or CI/CD releases with security verification and vulnerability results.
Change Management Dashboard
The Dashboard provides an overview of all pentests and change requests along with key metrics.
Dashboard Highlights
- Requests by Status — Track running, paused, completed, or pending requests.
- Recent Activities — See recent submissions, updates, and completions.
- Vulnerability Overview — Visualize vulnerabilities associated with each change request, categorized by severity.
- Top Priority Requests — Quickly identify ongoing or urgent security validations.
Creating a Change Request
Creating a change request captures all necessary information for a release or update validation.Navigate to Change Management → Change Requests
Click Create New Request to open the change submission form.
Add Request Summary
Include priority level, title, requester details, contact information, and a concise summary of the change.
Add Technical Details
Provide environment details, URLs, authentication credentials, and link any API documentation or files.

Viewing and Managing Change Requests
All existing requests are listed in the Change Requests tab, where you can view, search, and filter by state, priority, or update date. Each request includes linked vulnerabilities, associated evidence, and live metrics showing open/closed issues, severity breakdowns, and trends.
Adding Vulnerabilities to a Change Request
During or after validation, vulnerabilities identified are automatically linked to their associated Change Request.From the Assessment
Select vulnerabilities discovered during the pentest and map them to the related change request.
Auto Link via Integration
If connected with CI/CD or scanners, vulnerabilities are automatically assigned to their respective change ID.

Change Info
The Change Info section provides a complete overview of the change request and its technical context.It helps security teams understand what is changing, who owns it, and how risky the change is before testing begins.

Included Information
- Request Details — Title, requester, contact, dates, and ticket ID
- Technical Information — Tech stack, integrations, data sensitivity, production impact
- Pentest Requirements — Priority, deadlines, go/no-go criteria
- Technical Access Details — Environment, URLs, authentication method, credentials
- Change Summary — Release notes and functional updates
Settings
The Settings tab allows teams to configure how the assessment behaves and how results are managed.
What You Can Configure
- Assessment metadata (name, date, category)
- Default ticket assignee
- Business unit and department mapping
- Collaborators and access
- Assessment type and lifecycle state
Import CSV (Within Settings)
The Import CSV option allows bulk ingestion of vulnerabilities into the change request.
Why Use Import CSV
- Upload results from third-party scanners
- Migrate findings from legacy tools
- Speed up onboarding of large vulnerability sets
- Standardize vulnerability intake for change testing
Export CSV (Within Settings)
The Export CSV option enables teams to extract assessment data for offline analysis or compliance needs.
Common Use Cases
- Share findings with external teams
- Perform custom analytics
- Maintain audit records
- Backup assessment data
Custom Report
The Custom Report section allows users to manually curate executive-ready or client-facing reports.
Custom Report Sections
- Report Title
- Author & Reviewer
- Executive Summary
- Custom Scope
- Methodology
- Conclusion
- Action Plan
Activity
The Activity tab provides a chronological audit trail of all actions performed within the change request.
Tracked Events
- Assessment type changes (Black / Grey / White box)
- Status updates (Started, Paused, Completed)
- Configuration changes
- User actions and timestamps
Docs & Evidences
The Docs & Evidences section is used to upload proof, screenshots, logs, and supporting files related to the assessment.
Evidence Management
- Upload up to 20 files per upload
- Max 10 MB per file
- Store screenshots, logs, videos, or PDFs
- Maintain evidence for audits and revalidation
Why This Matters
Modern security failures often originate from well-intentioned changes — rushed releases, undocumented fixes, or unreviewed configuration updates.The Change Management module ensures that security is not an afterthought, but an embedded control point in every release cycle. By combining request context, technical validation, vulnerability tracking, reporting, and evidence collection into a single workflow, Snapsec enables teams to:
- Prevent risky changes from reaching production without proper security validation
- Maintain continuous visibility into how each change impacts risk posture
- Create defensible audit trails linking changes, findings, approvals, and evidence
- Align engineering velocity with security governance, not slow it down
- Support compliance requirements with structured data instead of manual documentation
Explore Live Demo
Explore Snapsec Live — No Signup Needed
Jump straight into the live environment and see how Snapsec unifies asset intelligence, threat detection, and vulnerability tracking — all in one dashboard.