<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_CM.L2-3.4.3.d</id>
	<title>LLMResponse CM.L2-3.4.3.d - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_CM.L2-3.4.3.d"/>
	<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_CM.L2-3.4.3.d&amp;action=history"/>
	<updated>2026-04-20T06:05:13Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://cmmcwiki.org/index.php?title=LLMResponse_CM.L2-3.4.3.d&amp;diff=1451&amp;oldid=prev</id>
		<title>David: Created page with &quot;I&#039;ll help you evaluate how to best collect evidence for the assessment objective &quot;[d] changes to the system are logged&quot; within CM.L2-3.4.3. Based on the CMMC Level 2 Assessment Guide and your assessment approaches, I&#039;ll rank the evidence types and prioritize assessment approaches.  == Evidence Types Ranking for &quot;[d] changes to the system are logged&quot; ==  1. **Artifacts (I1)** - Highest priority evidence type because it provides direct proof that changes are being logged:...&quot;</title>
		<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_CM.L2-3.4.3.d&amp;diff=1451&amp;oldid=prev"/>
		<updated>2025-04-06T03:02:50Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;I&amp;#039;ll help you evaluate how to best collect evidence for the assessment objective &amp;quot;[d] changes to the system are logged&amp;quot; within CM.L2-3.4.3. Based on the CMMC Level 2 Assessment Guide and your assessment approaches, I&amp;#039;ll rank the evidence types and prioritize assessment approaches.  == Evidence Types Ranking for &amp;quot;[d] changes to the system are logged&amp;quot; ==  1. **Artifacts (I1)** - Highest priority evidence type because it provides direct proof that changes are being logged:...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;I&amp;#039;ll help you evaluate how to best collect evidence for the assessment objective &amp;quot;[d] changes to the system are logged&amp;quot; within CM.L2-3.4.3. Based on the CMMC Level 2 Assessment Guide and your assessment approaches, I&amp;#039;ll rank the evidence types and prioritize assessment approaches.&lt;br /&gt;
&lt;br /&gt;
== Evidence Types Ranking for &amp;quot;[d] changes to the system are logged&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
1. **Artifacts (I1)** - Highest priority evidence type because it provides direct proof that changes are being logged:&lt;br /&gt;
   - System-generated change logs&lt;br /&gt;
   - Audit logs showing configuration changes&lt;br /&gt;
   - Database records of change history&lt;br /&gt;
   - Version control system logs&lt;br /&gt;
   - Change management tool reports showing logged changes&lt;br /&gt;
   - System backup logs that capture pre and post-change states&lt;br /&gt;
&lt;br /&gt;
2. **Screen Share (I4)** - Second most valuable evidence type for this objective:&lt;br /&gt;
   - Live demonstration of how changes are captured in logs&lt;br /&gt;
   - Real-time viewing of change logging mechanisms&lt;br /&gt;
   - Display of historical change logs in systems&lt;br /&gt;
   - Showing how to query or extract change log information&lt;br /&gt;
&lt;br /&gt;
3. **Documents (I2)** - Third most valuable evidence type:&lt;br /&gt;
   - Configuration management policy that requires logging of changes&lt;br /&gt;
   - Procedures describing change logging requirements&lt;br /&gt;
   - System security plan sections addressing change logging&lt;br /&gt;
   - Log retention policies for change records&lt;br /&gt;
   - Change management plan describing logging processes&lt;br /&gt;
&lt;br /&gt;
4. **Physical Review (I3)** - Lowest priority for this objective since logging is primarily digital:&lt;br /&gt;
   - Physical access to logging servers or systems&lt;br /&gt;
   - Observation of automated logging processes&lt;br /&gt;
   - Physical storage of archived logs (if applicable)&lt;br /&gt;
&lt;br /&gt;
== Assessment Approach Prioritization ==&lt;br /&gt;
&lt;br /&gt;
1. **Examine (C1)** - Primary approach because:&lt;br /&gt;
   - It allows direct review of the actual change logs&lt;br /&gt;
   - You can verify complete and consistent logging practices&lt;br /&gt;
   - It demonstrates the integrity and retention of change logs&lt;br /&gt;
   - Key assessment objects: system audit logs and records, change control records, system configuration settings and associated documentation&lt;br /&gt;
&lt;br /&gt;
2. **Test (C3)** - Second priority for this objective:&lt;br /&gt;
   - Verify that all types of changes trigger appropriate logging&lt;br /&gt;
   - Test that logs capture required details (who, what, when, where)&lt;br /&gt;
   - Validate log integrity and retention capabilities&lt;br /&gt;
   - Key assessment objects: mechanisms that implement configuration change control&lt;br /&gt;
&lt;br /&gt;
3. **Interview (C2)** - Third priority but still important:&lt;br /&gt;
   - Helps understand logging configurations and practices&lt;br /&gt;
   - Reveals log management and protection measures&lt;br /&gt;
   - Identifies any potential gaps in logging coverage&lt;br /&gt;
   - Key personnel: system or network administrators, personnel with configuration change control responsibilities&lt;br /&gt;
&lt;br /&gt;
== Practical Implementation Strategy ==&lt;br /&gt;
&lt;br /&gt;
For optimal assessment of &amp;quot;[d] changes to the system are logged&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
1. Start by examining change logs:&lt;br /&gt;
   - System audit logs showing configuration changes&lt;br /&gt;
   - Change management tool logs&lt;br /&gt;
   - Administrator activity logs&lt;br /&gt;
   - Look for completeness of information (date/time, user, action, before/after states)&lt;br /&gt;
&lt;br /&gt;
2. Test the logging mechanisms by:&lt;br /&gt;
   - Making a controlled change and verifying it&amp;#039;s properly logged&lt;br /&gt;
   - Ensuring different types of changes (hardware, software, configuration) are logged&lt;br /&gt;
   - Checking that logs are protected from unauthorized modification&lt;br /&gt;
   - Verifying log retention meets policy requirements&lt;br /&gt;
&lt;br /&gt;
3. Interview key personnel about:&lt;br /&gt;
   - Log configuration and management&lt;br /&gt;
   - Log review processes&lt;br /&gt;
   - Log protection measures&lt;br /&gt;
   - Log retention policies and procedures&lt;br /&gt;
&lt;br /&gt;
This comprehensive approach will provide strong evidence that your organization is meeting the requirement for logging changes to organizational systems, which is essential for CMMC Level 2 compliance.&lt;br /&gt;
&lt;br /&gt;
When implementing this strategy, focus on demonstrating that the logs:&lt;br /&gt;
- Capture all relevant changes&lt;br /&gt;
- Include sufficient detail for accountability&lt;br /&gt;
- Are protected from tampering&lt;br /&gt;
- Are retained for an appropriate period&lt;br /&gt;
- Can be retrieved when needed for investigation or audit&lt;/div&gt;</summary>
		<author><name>David</name></author>
	</entry>
</feed>