Under active development Content is continuously updated and improved

CM-05Access Restrictions for Change

Low
Moderate
Core Control

>Control Description

Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.

>Discussion

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or individuals’ privacy. Therefore, organizations permit only qualified and authorized individuals to access systems for purposes of initiating changes. Access restrictions include physical and logical access controls (see AC-3 and PE-3), software libraries, workflow automation, media libraries, abstract layers (i.e., changes implemented into external interfaces rather than directly into systems), and change windows (i.e., changes occur only during specified times).

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.