Define, document, approve, and enforce physical and logical access restrictions
π What This Means
This practice requires organizations to clearly define and document who has access to their physical and digital systems, how that access is approved, and how it is enforced. This means creating policies that outline who can enter certain areas, use specific devices, or access sensitive data. For example, only authorized IT staff should have access to server rooms, and only certain employees should have access to financial records. The goal is to prevent unauthorized access that could lead to data breaches or other security incidents. Think of it like having a guest list for a partyβonly those on the list are allowed in, and thereβs someone checking IDs at the door.
π― Why It Matters
Unrestricted access to physical and logical systems is a major security risk. Without proper controls, unauthorized users can easily gain access to sensitive information or critical infrastructure. For instance, in 2017, a breach at Equifax exposed the personal data of 147 million people due to lax access controls. The financial cost of such breaches can run into millions, not to mention the damage to reputation and loss of customer trust. From a DoD perspective, ensuring that only authorized personnel can access Controlled Unclassified Information (CUI) is crucial for national security. This control helps mitigate these risks by ensuring that access is tightly regulated and monitored.
β How to Implement
- 1. Define access policies for cloud resources using IAM roles and policies.
- 2. Document these policies in a centralized repository.
- 3. Use multi-factor authentication (MFA) for all cloud accounts.
- 4. Regularly review and update access permissions.
- 5. Implement logging and monitoring for access attempts.
- 6. Ensure that access approvals are documented and auditable.
- 7. Use encryption for data at rest and in transit.
π Evidence Examples
Access Control Policy
Access Logs
Approval Records
Training Records
Configuration Screenshots
π SSP Guidance
Use this guidance when writing the System Security Plan (SSP) narrative for this control.
How to Write the SSP Narrative
For CM.L2-3.4.5 ("Define, document, approve, and enforce physical and logical access restrictions"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your configuration management process, including baseline configurations, change control procedures, vulnerability management, and how configuration compliance is monitored and enforced. Be specific -- name your actual products, settings, and responsible personnel.
Example SSP Narratives
"CM.L2-3.4.5 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to define, document, approve, and enforce physical and logical access restrictions. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."
"CM.L2-3.4.5 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to define, document, approve, and enforce physical and logical access restrictions. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."
"CM.L2-3.4.5 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."
System Boundary Considerations
- β’ Identify all system types within the CUI boundary requiring baselines
- β’ Document configuration management tools and CMDB
- β’ Map change control workflow from request to implementation
- β’ Ensure this control covers all systems within your defined CUI boundary where define, document, approve, and enforce physical and logical access restrictions applies
- β’ Document any systems where this control is not applicable and explain why
Key Documentation to Reference in SSP
- π Configuration Management Policy
- π Baseline configuration documents
- π Change management records
- π CMDB/asset inventory
- π Evidence artifacts specific to CM.L2-3.4.5
- π POA&M entry if control is not fully implemented
What the Assessor Looks For
The assessor will compare actual system configurations against documented baselines, review change tickets for proper approval workflow, and verify vulnerability remediation within SLA.
π¬ Self-Assessment Questions
Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.
Question 1: Do you have a documented access control policy?
Question 2: Are access permissions reviewed regularly?
Question 3: Is multi-factor authentication (MFA) enabled for all accounts?
Question 4: Are access logs maintained and monitored?
Question 5: Are access approvals documented and auditable?
β οΈ Common Mistakes (What Auditors Flag)
1. Lack of regular access reviews
2. Inconsistent access policies across environments
3. Inadequate documentation of access approvals
4. Failure to enable MFA
5. Not monitoring access logs
π Parent Policy
This practice is governed by the Configuration Management Policy