CM-5(1)
CM-5(1): Automated Access Enforcement and Audit Records
- (a): Enforce access restrictions using [mechanisms used to automate the enforcement of access restrictions are defined;] ; and
- (b): Automatically generate audit records of the enforcement actions.
Supplemental
Organizations log system accesses associated with applying configuration changes to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes.
| CIA Levels | |
|---|---|
| Confidentiality | unknown |
| Integrity | moderate |
| Availability | unknown |
| Overlays |
|---|
| DAF Baseline |
| CSF Categories |
|---|
| None |