<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_PS.L2-3.9.2.a</id>
	<title>LLMResponse PS.L2-3.9.2.a - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_PS.L2-3.9.2.a"/>
	<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_PS.L2-3.9.2.a&amp;action=history"/>
	<updated>2026-04-20T05:10:18Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://cmmcwiki.org/index.php?title=LLMResponse_PS.L2-3.9.2.a&amp;diff=1412&amp;oldid=prev</id>
		<title>David: Created page with &quot;I&#039;d be happy to help with your CMMC assessment task. Let me analyze the evidence types and assessment approaches for assessment objective [a] of PS.L2-3.9.2 - PERSONNEL ACTIONS.  == Evidence Types Ranking for Assessment Objective [a] ==  For the assessment objective &quot;[a] a policy and/or process for terminating system access and any credentials coincident with personnel actions is established,&quot; here&#039;s how I would rank the evidence types:  1. **Documents (I2)** - Highest p...&quot;</title>
		<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_PS.L2-3.9.2.a&amp;diff=1412&amp;oldid=prev"/>
		<updated>2025-04-03T02:48:18Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;I&amp;#039;d be happy to help with your CMMC assessment task. Let me analyze the evidence types and assessment approaches for assessment objective [a] of PS.L2-3.9.2 - PERSONNEL ACTIONS.  == Evidence Types Ranking for Assessment Objective [a] ==  For the assessment objective &amp;quot;[a] a policy and/or process for terminating system access and any credentials coincident with personnel actions is established,&amp;quot; here&amp;#039;s how I would rank the evidence types:  1. **Documents (I2)** - Highest p...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;I&amp;#039;d be happy to help with your CMMC assessment task. Let me analyze the evidence types and assessment approaches for assessment objective [a] of PS.L2-3.9.2 - PERSONNEL ACTIONS.&lt;br /&gt;
&lt;br /&gt;
== Evidence Types Ranking for Assessment Objective [a] ==&lt;br /&gt;
&lt;br /&gt;
For the assessment objective &amp;quot;[a] a policy and/or process for terminating system access and any credentials coincident with personnel actions is established,&amp;quot; here&amp;#039;s how I would rank the evidence types:&lt;br /&gt;
&lt;br /&gt;
1. **Documents (I2)** - Highest priority &lt;br /&gt;
   - This would include formal personnel security policies, procedures addressing personnel transfer/termination, and documented processes for revoking access&lt;br /&gt;
   - These documents would directly demonstrate that a policy/process has been established&lt;br /&gt;
&lt;br /&gt;
2. **Artifacts (I1)** - High priority&lt;br /&gt;
   - Examples would include records of terminated credentials, templates for termination checklists, or help desk tickets showing the process in action&lt;br /&gt;
   - These provide proof that the policy is implemented and followed&lt;br /&gt;
&lt;br /&gt;
3. **Screen Share (I4)** - Medium priority&lt;br /&gt;
   - Showing the actual tools or systems used to manage access removal&lt;br /&gt;
   - This can demonstrate how the process works in practice&lt;br /&gt;
&lt;br /&gt;
4. **Physical Review (I3)** - Lower priority for this objective&lt;br /&gt;
   - Could include reviewing physical security measures but is less relevant for demonstrating that a policy is established&lt;br /&gt;
&lt;br /&gt;
== Assessment Approaches Prioritization ==&lt;br /&gt;
&lt;br /&gt;
For obtaining evidence to meet assessment objective [a], I recommend prioritizing the assessment approaches as follows:&lt;br /&gt;
&lt;br /&gt;
1. **Examine (C1)** - Highest priority&lt;br /&gt;
   - This should be your primary approach since you need to review formal documentation&lt;br /&gt;
   - Focus on examining personnel security policies, procedures for termination/transfer, and any related process documents&lt;br /&gt;
   - The assessment objects identified in D1 are essential for demonstrating compliance with this objective&lt;br /&gt;
&lt;br /&gt;
2. **Interview (C2)** - Secondary priority&lt;br /&gt;
   - Interviews with personnel security managers, HR representatives, and IT administrators can verify understanding of policies&lt;br /&gt;
   - Can help confirm that documented processes are known and followed&lt;br /&gt;
   - These interviews provide context for your document examination&lt;br /&gt;
&lt;br /&gt;
3. **Test (C3)** - Tertiary priority&lt;br /&gt;
   - While testing is valuable for objectives [b] and [c], it&amp;#039;s less crucial for objective [a]&lt;br /&gt;
   - Testing would mainly verify that mechanisms supporting the policy actually work, but the focus of [a] is on establishing the policy itself&lt;br /&gt;
&lt;br /&gt;
== Recommendation for Objective [a] ==&lt;br /&gt;
&lt;br /&gt;
I recommend you:&lt;br /&gt;
&lt;br /&gt;
1. First collect and examine all relevant policy and procedure documents that outline the process for terminating system access&lt;br /&gt;
2. Follow up with interviews of key personnel to confirm their understanding of the policy&lt;br /&gt;
3. Use targeted testing only if there are gaps in the documentation&lt;br /&gt;
&lt;br /&gt;
Since objective [a] specifically focuses on whether &amp;quot;a policy and/or process is established,&amp;quot; your strongest evidence will be well-documented policies, procedures, and guidelines related to terminating system access when personnel actions occur.&lt;/div&gt;</summary>
		<author><name>David</name></author>
	</entry>
</feed>