Change Management Patterns
Change management patterns from real production changes. Every entry has a date and context.
2026-03: Verify Before AND After Every Change
Situation: Made a config change without checking the before state — couldn’t prove what changed when things broke
Context: sed in-place editing, SSH config modifications, ISE policy changes
The Pattern:
# ALWAYS: verify -> change -> verify
sudo awk 'NR==73' /etc/ssh/sshd_config # BEFORE
sudo sed -i '73s/#GSSAPIAuthentication no/GSSAPIAuthentication yes/' /etc/ssh/sshd_config # CHANGE
sudo awk 'NR==73' /etc/ssh/sshd_config # AFTER
Principle: If you don’t capture the before state, you can’t prove what you changed. Verify-change-verify is non-negotiable. This applies to CLI commands, ISE policies, firewall rules — everything.
Source: Multiple incidents, formalized as standard practice