Show/Hide Toolbars

ABCI Consultants

Guidance for NIST 800-171 Assessment & Compliance

Navigation: CM-FAMILY: CONFIGURATION MANAGEMENT

CM-5(2) ACCESS RESTRICTIONS FOR CHANGE  |  REVIEW SYSTEM CHANGES

Scroll Prev Top Next More

Applicable

(Y)es / (N)o

(C)onfidentiality

(I)ntegrity

(A)vailability

RPN

(C+I+A)

(S)atisfactory

L1

M2

H3

L1

M2

H3

L1

M2

H3

(O)ther than satisfactory +##

 

 

 

 

 

 

 

 

 

 

 

 

###

cm-5(2)

access restrictions for change  | review system changes

 

assessment objective:

Determine if the organization, in an effort to ascertain whether unauthorized changes have occurred:

cm-5(2)[1]

defines the frequency to review information system changes;

cm-5(2)[2]

defines circumstances that warrant review of information system changes;

cm-5(2)[3]

reviews information system changes with the organization-defined frequency; and

cm-5(2)[4]

reviews information system changes with the organization-defined circumstances.

potential assessment methods and objects:

Examine: [select from: Configuration management policy; procedures addressing access restrictions for changes to the information system; configuration management plan; security plan; reviews of information system changes; audit and review reports; change control records; information system audit records; other relevant documents or records].

Interview: [select from: Organizational personnel with information security responsibilities; system/network administrators].

Test: [select from: Organizational processes for managing access restrictions to change; automated mechanisms supporting/implementing information system reviews to determine whether unauthorized changes have occurred].

Hosted by ABCI Consultants for Information Security Management Systems | Implementations, Training and Assessments for Compliance | (800) 644-2056