Skip to main content
NetStable
Level 1 AC.L1-3.1.2

Limit system access to the types of transactions and functions that authorized users are permitted to execute

πŸ“– What This Means

This control ensures that users can only perform actions and access functions within a system that they are explicitly authorized to use. Think of it like giving employees access only to the tools and files they need for their jobβ€”nothing more. For example, an accountant should only have access to financial systems, not HR records. This prevents accidental or intentional misuse of systems, such as deleting critical files or accessing sensitive data. In simpler terms, it’s about enforcing the principle of 'need to know' or 'least privilege' to keep systems secure.

🎯 Why It Matters

Restricting access to only necessary functions helps prevent unauthorized actions that could lead to data breaches, system damage, or compliance violations. For example, in the 2017 Equifax breach, hackers exploited an unpatched system vulnerability, but broader access controls could have limited the damage. The average cost of a data breach is $4.45 million (IBM, 2023), and unauthorized access is a leading cause. From a DoD/CMMC perspective, this control ensures that Controlled Unclassified Information (CUI) is protected from unauthorized access or misuse, which is critical for maintaining trust and compliance.

βœ… How to Implement

  1. 1. Use AWS IAM roles or Azure RBAC to assign specific permissions to users based on their job functions.
  2. 2. Configure policies to restrict access to specific services, such as limiting S3 bucket access to read-only for certain users.
  3. 3. Enable logging for all access and transaction activities using AWS CloudTrail or Azure Monitor.
  4. 4. Regularly review and update permissions using tools like AWS IAM Access Analyzer or Azure Privileged Identity Management.
  5. 5. Implement multi-factor authentication (MFA) to add an extra layer of security for sensitive transactions.
⏱️
Estimated Effort
Initial setup: 8-16 hours (depending on system complexity). Ongoing maintenance: 2-4 hours/month. Skill level: Intermediate IT/security knowledge.

πŸ“‹ Evidence Examples

Access Control Policy

Format: PDF/DOCX
Frequency: Annually or when roles change.
Contents: Document outlining roles, permissions, and access restrictions.
Collection: Export from policy management system.

Permission Configuration Screenshot

Format: PNG/JPG
Frequency: Quarterly.
Contents: Screenshot showing user roles and permissions in Active Directory or cloud IAM.
Collection: Capture from system interface.

Access Logs

Format: CSV/Log file
Frequency: Monthly.
Contents: Logs showing user access attempts and transactions.
Collection: Export from monitoring tools like Splunk or CloudTrail.

Audit Report

Format: PDF
Frequency: Quarterly.
Contents: Report detailing access control review findings.
Collection: Generate from auditing tools.

Training Records

Format: Excel/PDF
Frequency: Annually.
Contents: Records of employee training on access control policies.
Collection: Export from LMS or HR system.

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For AC.L1-3.1.2 ("Limit system access to the types of transactions and functions that authorized users are permitted to execute"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how access to CUI systems is controlled, including the specific IAM tools, policies, and processes used. Reference your Access Control Policy and identify the systems in scope. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"AC.L1-3.1.2 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to limit system access to the types of transactions and functions that authorized u.... The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"AC.L1-3.1.2 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to limit system access to the types of transactions and functions that authorized u.... Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"AC.L1-3.1.2 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Identify all access points to CUI systems (VPN, direct network, cloud portals)
  • β€’ Document which IAM system manages access (Azure AD, AWS IAM, on-prem AD)
  • β€’ Map user roles to system access levels
  • β€’ Ensure this control covers all systems within your defined CUI boundary where limit system access to the types of transactions and functions that authorized users are permitted to execute applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ Access Control Policy
  • πŸ“„ IAM configuration documentation
  • πŸ“„ Access request and approval records
  • πŸ“„ Evidence artifacts specific to AC.L1-3.1.2
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify that access controls are implemented as described, test whether unauthorized users are blocked, and review access logs for evidence of enforcement.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Have you defined and documented user roles and permissions?

βœ… YES β†’ Proceed to Q2.
❌ NO β†’ GAP: Document roles and permissions in an Access Control Policy. Timeline: 1 week.

Question 2: Are permissions enforced based on job functions?

βœ… YES β†’ Proceed to Q3.
❌ NO β†’ GAP: Configure permissions in Active Directory or cloud IAM. Timeline: 2 weeks.

Question 3: Are access logs being monitored and reviewed regularly?

βœ… YES β†’ Proceed to Q4.
❌ NO β†’ GAP: Enable logging and set up a review process. Timeline: 1 week.

Question 4: Have unnecessary permissions been removed?

βœ… YES β†’ Proceed to Q5.
❌ NO β†’ GAP: Conduct a permissions review and remove excess access. Timeline: 2 weeks.

Question 5: Is MFA enabled for sensitive transactions?

βœ… YES β†’ Compliant.
❌ NO β†’ GAP: Implement MFA using tools like Duo or Okta. Timeline: 1 week.

⚠️ Common Mistakes (What Auditors Flag)

1. Overly broad permissions.

Why this happens: Assigning access based on convenience rather than need.
How to avoid: Follow the principle of least privilege and regularly review permissions.

2. No logging or monitoring.

Why this happens: Lack of awareness or resources.
How to avoid: Enable logging and set up automated monitoring tools like Splunk.

3. Outdated policies.

Why this happens: Failure to update documentation when roles change.
How to avoid: Schedule regular reviews and updates of access control policies.

4. Inconsistent enforcement across environments.

Why this happens: Separate management of cloud and on-premise systems.
How to avoid: Use centralized tools like Azure Arc for hybrid environments.

5. Missing MFA for sensitive transactions.

Why this happens: Overlooking the importance of additional authentication.
How to avoid: Enable MFA for all users accessing sensitive functions.

πŸ“š Parent Policy

This practice is governed by the Access Control Policy

View AC Policy β†’

πŸ“š Related Controls