LLMResponse AC.L2-3.1.1.f
Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [f]
Ranking of Evidence Types for Assessment Objective [f]
For the assessment objective "[f] system access is limited to authorized devices (including other systems)," I recommend prioritizing evidence types in this order:
1. **Artifacts**: These provide the strongest evidence for this device-focused objective, including:
- Network access control system logs showing blocked unauthorized devices - Device authentication configurations (802.1x, certificates, etc.) - Network firewall and router access control lists - MAC address filtering tables - DHCP server configurations with allowed device lists - System logs showing connection attempts from unauthorized devices
2. **Screen Share**: Observing network control systems provides powerful validation:
- Demonstrations of network access control mechanisms in action - Viewing device authentication systems - Observing blocked connection attempts from unauthorized devices - Watching network monitoring dashboards that show connected devices
3. **Documents**: Supporting policies and implementation documentation:
- Device connection authorization procedures - Network security architecture diagrams - System security plans describing device access controls - Network access policies defining authorized devices - Device registration and approval workflows
4. **Physical Review**: Supporting physical controls:
- Physical network security measures (locked network ports, secured access points) - Network infrastructure security implementations - Physical access controls for network equipment
Prioritizing Assessment Approaches
For assessment objective [f], I recommend prioritizing the three assessment approaches as follows:
1. **Test**: This should be your primary approach for verifying device access limitations:
- Test that unauthorized devices cannot connect to the network - Verify that device authentication mechanisms function correctly - Confirm that network access controls enforce device restrictions - Attempt connections from unregistered devices to verify blocking - Test that recognized devices gain appropriate access
2. **Examine**: Follow with examination of supporting configurations:
- Review network access control configurations - Examine device authentication mechanisms - Check network device inventories against connected device logs - Review network segmentation implementations - Examine firewall rules limiting device connections
3. **Interview**: Complete your assessment with technical interviews:
- Speak with network administrators who manage device access - Interview security personnel about device control strategies - Discuss with IT staff how they enforce device-based access limitations
This prioritization focuses first on testing the actual operational effectiveness of controls limiting system access to authorized devices, followed by examining the underlying configurations, and finally confirming understanding through interviews with personnel responsible for implementation.
By focusing on testing first, you'll directly verify that unauthorized devices are prevented from accessing the system, which is the core of this assessment objective.