
Change Management Dashboard showing request summary and vulnerability overview
Overview
The Change Management module allows organizations to securely track and assess changes introduced to their applications, infrastructure, or APIs.It ensures that every new release or feature undergoes a controlled security review before production deployment. Whether you are performing internal change reviews or managing external pentest requests, this module provides a unified process for security validation, approval tracking, and evidence management.
Purpose
Every code deployment or configuration update can impact the security posture.Change Management in Snapsec VM formalizes this process by:
- Documenting change requests with relevant context (title, owner, timeline, dependencies).
- Running targeted assessments on new or modified components.
- Tracking vulnerabilities introduced or fixed through each release.
- Maintaining traceability between changes, vulnerabilities, and pentest results.
Value
Security in Every Release
Centralized Request Tracking
Evidence-based Validation
Seamless Integration
Change Management Dashboard
The Dashboard provides an overview of all pentests and change requests along with key metrics.
Dashboard view summarizing requests and vulnerability distribution
Dashboard Highlights
- Requests by Status — Track running, paused, completed, or pending requests.
- Recent Activities — See recent submissions, updates, and completions.
- Vulnerability Overview — Visualize vulnerabilities associated with each change request, categorized by severity.
- Top Priority Requests — Quickly identify ongoing or urgent security validations.
Creating a Change Request
Creating a change request captures all necessary information for a release or update validation.Navigate to Change Management → Change Requests
Add Request Summary
Set Timeline
Add Technical Details
Submit for Review

Change Request creation form capturing summary and technical details
Viewing and Managing Change Requests
All existing requests are listed in the Change Requests tab, where you can view, search, and filter by state, priority, or update date. Each request includes linked vulnerabilities, associated evidence, and live metrics showing open/closed issues, severity breakdowns, and trends.
Change Request details with metrics and vulnerability insights
Adding Vulnerabilities to a Change Request
During or after validation, vulnerabilities identified are automatically linked to their associated Change Request.From the Assessment
Auto Link via Integration
Review and Track Progress

Metrics showing severity distribution and vulnerability progress within a change request
Change Info
The Change Info section provides a complete overview of the change request and its technical context.It helps security teams understand what is changing, who owns it, and how risky the change is before testing begins.

Change Request – Change Info
Included Information
- Request Details — Title, requester, contact, dates, and ticket ID
- Technical Information — Tech stack, integrations, data sensitivity, production impact
- Pentest Requirements — Priority, deadlines, go/no-go criteria
- Technical Access Details — Environment, URLs, authentication method, credentials
- Change Summary — Release notes and functional updates
Settings
The Settings tab allows teams to configure how the assessment behaves and how results are managed.
Change Request – Settings Overview
What You Can Configure
- Assessment metadata (name, date, category)
- Default ticket assignee
- Business unit and department mapping
- Collaborators and access
- Assessment type and lifecycle state
Import CSV (Within Settings)
The Import CSV option allows bulk ingestion of vulnerabilities into the change request.
Import Vulnerabilities via CSV
Why Use Import CSV
- Upload results from third-party scanners
- Migrate findings from legacy tools
- Speed up onboarding of large vulnerability sets
- Standardize vulnerability intake for change testing
Export CSV (Within Settings)
The Export CSV option enables teams to extract assessment data for offline analysis or compliance needs.
Export Vulnerabilities to CSV
Common Use Cases
- Share findings with external teams
- Perform custom analytics
- Maintain audit records
- Backup assessment data
Custom Report
The Custom Report section allows users to manually curate executive-ready or client-facing reports.
Custom Report Editor
Custom Report Sections
- Report Title
- Author & Reviewer
- Executive Summary
- Custom Scope
- Methodology
- Conclusion
- Action Plan
Activity
The Activity tab provides a chronological audit trail of all actions performed within the change request.
Change Request Activity Timeline
Tracked Events
- Assessment type changes (Black / Grey / White box)
- Status updates (Started, Paused, Completed)
- Configuration changes
- User actions and timestamps
Docs & Evidences
The Docs & Evidences section is used to upload proof, screenshots, logs, and supporting files related to the assessment.
Upload Evidence Modal
Evidence Management
- Upload up to 20 files per upload
- Max 10 MB per file
- Store screenshots, logs, videos, or PDFs
- Maintain evidence for audits and revalidation
Why This Matters
Modern security failures often originate from well-intentioned changes — rushed releases, undocumented fixes, or unreviewed configuration updates.The Change Management module ensures that security is not an afterthought, but an embedded control point in every release cycle. By combining request context, technical validation, vulnerability tracking, reporting, and evidence collection into a single workflow, Snapsec enables teams to:
- Prevent risky changes from reaching production without proper security validation
- Maintain continuous visibility into how each change impacts risk posture
- Create defensible audit trails linking changes, findings, approvals, and evidence
- Align engineering velocity with security governance, not slow it down
- Support compliance requirements with structured data instead of manual documentation