CM-5(1): Automated Access Enforcement and Audit Records

CSF v1.1 References:

Threats Addressed:


  • High

Previous Version:

Control Statement

  1. Enforce access restrictions using [Assignment: organization-defined automated mechanisms]; and
  2. Automatically generate audit records of the enforcement actions.

Supplemental Guidance

Organizations log system accesses associated with applying configuration changes to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes.