PE-5(2) ACCESS CONTROL FOR OUTPUT DEVICES | ACCESS TO OUTPUT BY INDIVIDUAL IDENTITY |
Scroll Prev Top Next More |
Applicable (Y)es / (N)o |
(C)onfidentiality |
(I)ntegrity |
(A)vailability |
RPN (C+I+A) |
(S)atisfactory |
||||||
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
(O)ther than satisfactory +## |
||
|
|
|
|
|
|
|
|
|
|
|
|
###
pe-5(2) |
access control for output devices | access to output by individual identity |
||
|
assessment objective: Determine if: |
||
pe-5(2)(a) |
pe-5(2)(a)[1] |
the organization defines output devices whose output requires physical access controls; |
|
pe-5(2)(a)[2] |
the information system controls physical access to output from organization-defined output devices; and |
||
pe-5(2)(b) |
the information system links individual identity to receipt of the output from the device. |
||
potential assessment methods and objects: Examine: [select from: Physical and environmental protection policy; procedures addressing physical access control; information system design documentation; information system configuration settings and associated documentation; list of output devices and associated outputs requiring physical access controls; physical access control logs or records for areas containing output devices and related outputs; information system audit records; other relevant documents or records]. Interview: [select from: Organizational personnel with physical access control responsibilities; organizational personnel with information security responsibilities; system/network administrators; system developers]. Test: [select from: Organizational processes for access control to output devices; automated mechanisms supporting and/or implementing access control to output devices]. |