If the board is not deciding every time it meets, it is ceremony. And ceremony gets bypassed.
A Change Control Board is the governance primitive that says who has decision authority on what, and at what cadence. Every change management process (the checklist, the priority scale, the form) is downstream of that question.
This charter gives you:
What the CCB does not decide: release dates (set by release management / executive), technical implementation (owned by engineering), defect severity (assigned by the bug-reporting process). Clean decision-rights.
Executive Management may override a CCB approval or rejection. Overrides must be logged with rationale.
Frequent overrides are a charter-review signal, the CCB is not operating with appropriate authority, and the organization is working around it instead of fixing it.
Every CR scored. No exceptions. Teams that let "everything is urgent" through stop using the CCB within a year.
Smaller programs may consolidate roles. What cannot be consolidated: the distinction between who implements a change and who assesses its impact.
Priority-1 items trigger an out-of-cadence meeting or asynchronous disposition within one business day.
Each dev manager approves if (1) the change has no impact on their subsystems, OR (2) the dev team has fully unit- and component-tested all anticipated impacts, AND the manager has reported any material technical or business impact to the CCB.
"Development approved" ≠ "Development said yes in the meeting." Every role's approval is gated on evidence.
The test manager approves if (1) the test team has subjected the change to an agreed-upon set of tests, AND (2) the test manager has presented results to the CCB including risks assessed and mitigated and risks not yet assessed or mitigated.
The second half is load-bearing. Naming unmitigated risk explicitly is what lets the CCB weigh an approval honestly.
System and operations ready: runbooks current, monitoring in place, on-call trained on new failure modes, rollback path tested.
Either no material impact introduced, OR issues documented with customer responses posted and risks mitigated.
These two criteria close the loop between release and operations. Without them, the CCB is signing off on code only.
Short criteria, real authority. Business sign-off prevents engineering-only decisions from shipping with zero commercial awareness.
All new and changed components checked in, correctly tagged. Team prepared to integrate into the scheduled release.
(1) All tasks complete. (2) All deliverables implemented, tested, integrated. (3) CCB approval received. (4) Team and executives notified.
Nine criteria. Nine sign-offs. That's the anti-rubber-stamp mechanism.
Silent bypass is not a low-risk path. It is a governance failure. Every low-risk path: named owner, defined guardrail, logged audit trail, published failure-mode list, quarterly CCB review.