<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_MA.L2-3.7.6.a</id>
	<title>LLMResponse MA.L2-3.7.6.a - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_MA.L2-3.7.6.a"/>
	<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_MA.L2-3.7.6.a&amp;action=history"/>
	<updated>2026-04-20T07:11:41Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://cmmcwiki.org/index.php?title=LLMResponse_MA.L2-3.7.6.a&amp;diff=1398&amp;oldid=prev</id>
		<title>David: Created page with &quot;# Evidence Types and Assessment Approaches for Practice MA.L2-3.7.6  Based on my analysis of the CMMC Level 2 Assessment Guide and the information provided about practice MA.L2-3.7.6 (Maintenance Personnel), I can provide recommendations on evidence types and assessment approaches for the objective: &quot;[a] maintenance personnel without required access authorization are supervised during maintenance activities.&quot;  == Ranking of Evidence Types ==  From most to least valuable...&quot;</title>
		<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_MA.L2-3.7.6.a&amp;diff=1398&amp;oldid=prev"/>
		<updated>2025-04-02T04:51:56Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;# Evidence Types and Assessment Approaches for Practice MA.L2-3.7.6  Based on my analysis of the CMMC Level 2 Assessment Guide and the information provided about practice MA.L2-3.7.6 (Maintenance Personnel), I can provide recommendations on evidence types and assessment approaches for the objective: &amp;quot;[a] maintenance personnel without required access authorization are supervised during maintenance activities.&amp;quot;  == Ranking of Evidence Types ==  From most to least valuable...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;# Evidence Types and Assessment Approaches for Practice MA.L2-3.7.6&lt;br /&gt;
&lt;br /&gt;
Based on my analysis of the CMMC Level 2 Assessment Guide and the information provided about practice MA.L2-3.7.6 (Maintenance Personnel), I can provide recommendations on evidence types and assessment approaches for the objective: &amp;quot;[a] maintenance personnel without required access authorization are supervised during maintenance activities.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Ranking of Evidence Types ==&lt;br /&gt;
&lt;br /&gt;
From most to least valuable for demonstrating compliance with this assessment objective:&lt;br /&gt;
&lt;br /&gt;
1. **Physical Review** - This provides the strongest evidence as it allows direct observation of supervision practices during maintenance activities.&lt;br /&gt;
&lt;br /&gt;
2. **Artifacts** - These provide tangible proof that supervision procedures are followed, such as maintenance logs with supervisor signatures, temporary account creation records, or escort logs.&lt;br /&gt;
&lt;br /&gt;
3. **Documents** - Written policies and procedures that define supervision requirements provide the foundation for compliance but need to be supported by evidence of implementation.&lt;br /&gt;
&lt;br /&gt;
4. **Screen Share** - While useful for some aspects, screen sharing has limited value for this objective as it primarily demonstrates the technical rather than physical supervision aspects.&lt;br /&gt;
&lt;br /&gt;
== Prioritization of Assessment Approaches ==&lt;br /&gt;
&lt;br /&gt;
I recommend prioritizing assessment approaches in this order:&lt;br /&gt;
&lt;br /&gt;
1. **Interview** - Interviews with IT security personnel and system administrators who manage maintenance activities provide crucial context about supervision practices and how temporary access is managed.&lt;br /&gt;
&lt;br /&gt;
2. **Examine** - Review of documents and artifacts such as:&lt;br /&gt;
   - Maintenance supervision procedures&lt;br /&gt;
   - Visitor logs showing escort assignments&lt;br /&gt;
   - Temporary account creation and deactivation records&lt;br /&gt;
   - Service provider contracts with supervision requirements&lt;br /&gt;
   - Maintenance records with supervisor signatures&lt;br /&gt;
&lt;br /&gt;
3. **Test** - While valuable, testing comes last as it&amp;#039;s more resource-intensive and should be targeted based on interview and examination findings. Testing might include:&lt;br /&gt;
   - Observing the process of creating temporary accounts for maintenance personnel&lt;br /&gt;
   - Verifying that access permissions are properly restricted&lt;br /&gt;
   - Confirming account expiration mechanisms function as intended&lt;br /&gt;
&lt;br /&gt;
== Implementation Recommendation ==&lt;br /&gt;
&lt;br /&gt;
To demonstrate compliance with this assessment objective, I recommend:&lt;br /&gt;
&lt;br /&gt;
1. Develop and document a formal procedure for supervising unauthorized maintenance personnel&lt;br /&gt;
2. Create standardized forms for documenting supervision activities&lt;br /&gt;
3. Implement a process for creating temporary accounts with appropriate restrictions and automatic expiration&lt;br /&gt;
4. Train staff responsible for supervision on proper procedures&lt;br /&gt;
5. Maintain logs of all maintenance activities including details of supervision provided&lt;br /&gt;
&lt;br /&gt;
These measures will create both the procedural framework and the evidence trail needed to demonstrate compliance with MA.L2-3.7.6&amp;#039;s supervision requirements during assessment.&lt;/div&gt;</summary>
		<author><name>David</name></author>
	</entry>
</feed>