CM-5(1)
      
        
        
      
      
        
  CM-5(1): Automated Access Enforcement and Audit Records
      
      
        
        
      
    
  - (a): Enforce access restrictions using [mechanisms used to automate the enforcement of access restrictions are defined;] ; and
- (b): Automatically generate audit records of the enforcement actions.
Supplemental
Organizations log system accesses associated with applying configuration changes to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes.
| CIA Levels | |
|---|---|
| Confidentiality | unknown | 
| Integrity | moderate | 
| Availability | unknown | 
| Overlays | 
|---|
| DAF Baseline | 
| CSF Categories | 
|---|
| None |