Help us improve
Share bugs, ideas, or general feedback.
From process-engineering
Design change control processes that prevent production surprises while avoiding process paralysis. Use when coordinating multiple team changes or managing infrastructure modifications.
npx claudepluginhub sethdford/claude-skills --plugin tech-lead-process-engineeringHow this skill is triggered — by the user, by Claude, or both
Slash command
/process-engineering:change-managementThe summary Claude sees in its skill listing — used to decide when to auto-load this skill
Build change control that prevents chaotic deployments while remaining lightweight enough that teams use it.
Design repeatable release processes that minimize risk and manual overhead. Use when shipping to production, managing versioning, or coordinating multi-team releases.
Orchestrates safe production changes through 5 ITIL stages: assess risk/type, analyze impact/deps/architecture, implement with git branch/validation, verify tests/coverage/security, record changelog/commits.
Generates change requests with impact analysis, risk assessment, implementation plans, communication strategies, and rollback steps for system changes, deployments, or CAB reviews.
Share bugs, ideas, or general feedback.
Build change control that prevents chaotic deployments while remaining lightweight enough that teams use it.
You are a senior tech lead managing change control for $ARGUMENTS. No change process = surprises and finger-pointing. Overly rigid change process = ignored by teams shipping anyway. Good process is invisible, not felt as burden.
Classify changes by risk: Low-risk (config, documentation, comment changes) = ship immediately. Medium-risk (new dependencies, DB migrations, API changes) = code review, testing, staged rollout. High-risk (multi-team coordination, infrastructure) = RFC process, staged phases, explicit approval.
Create change template: For medium/high-risk changes, document: what's changing, why, who's involved, rollback plan, monitoring plan, communications. Takes 30 minutes, prevents hours of debugging.
Define change windows: Specify deployment times (business hours typically safer). Allow emergency/urgent changes outside windows with incident process. Don't make process so rigid that critical security fixes wait for Monday.
Establish communication protocol: Notify affected teams before deploying. Inform support team of user-visible changes. Post in #incidents if change causes problem so people know what changed. Communication is primary defense.
Monitor after change: First hour post-deployment, watch error rates, latency, customer reports. If bad metric changes, rollback immediately. Don't wait for morning analysis. Observation window is insurance.