<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_PS.L2-3.9.2.b</id>
	<title>LLMResponse PS.L2-3.9.2.b - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_PS.L2-3.9.2.b"/>
	<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_PS.L2-3.9.2.b&amp;action=history"/>
	<updated>2026-04-20T07:10:49Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://cmmcwiki.org/index.php?title=LLMResponse_PS.L2-3.9.2.b&amp;diff=1415&amp;oldid=prev</id>
		<title>David: Created page with &quot;For the assessment objective &quot;[b] system access and credentials are terminated consistent with personnel actions such as termination or transfer,&quot; I&#039;ll rank the evidence types and prioritize assessment approaches based on the CMMC Level 2 guidance provided.  == Evidence Types Ranking for Assessment Objective [b] ==  1. **Artifacts (I1)** - Highest priority    - Records of terminated credentials    - System logs showing access removal    - Completed termination checklists...&quot;</title>
		<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_PS.L2-3.9.2.b&amp;diff=1415&amp;oldid=prev"/>
		<updated>2025-04-03T02:50:25Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;For the assessment objective &amp;quot;[b] system access and credentials are terminated consistent with personnel actions such as termination or transfer,&amp;quot; I&amp;#039;ll rank the evidence types and prioritize assessment approaches based on the CMMC Level 2 guidance provided.  == Evidence Types Ranking for Assessment Objective [b] ==  1. **Artifacts (I1)** - Highest priority    - Records of terminated credentials    - System logs showing access removal    - Completed termination checklists...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;For the assessment objective &amp;quot;[b] system access and credentials are terminated consistent with personnel actions such as termination or transfer,&amp;quot; I&amp;#039;ll rank the evidence types and prioritize assessment approaches based on the CMMC Level 2 guidance provided.&lt;br /&gt;
&lt;br /&gt;
== Evidence Types Ranking for Assessment Objective [b] ==&lt;br /&gt;
&lt;br /&gt;
1. **Artifacts (I1)** - Highest priority&lt;br /&gt;
   - Records of terminated credentials&lt;br /&gt;
   - System logs showing access removal&lt;br /&gt;
   - Completed termination checklists&lt;br /&gt;
   - Help desk tickets showing access revocation&lt;br /&gt;
   - These artifacts directly demonstrate that the organization is actively implementing the process&lt;br /&gt;
&lt;br /&gt;
2. **Screen Share (I4)** - High priority&lt;br /&gt;
   - Live demonstration of access termination processes&lt;br /&gt;
   - Observation of administrators using access management systems&lt;br /&gt;
   - Review of audit logs or user account status changes&lt;br /&gt;
   - This provides direct evidence of how the process works in practice&lt;br /&gt;
&lt;br /&gt;
3. **Documents (I2)** - Medium priority&lt;br /&gt;
   - While important, documents alone can&amp;#039;t demonstrate actual implementation&lt;br /&gt;
   - Examples include termination procedures, access removal checklists, and timelines&lt;br /&gt;
   - These support understanding the process but don&amp;#039;t prove it&amp;#039;s being followed&lt;br /&gt;
&lt;br /&gt;
4. **Physical Review (I3)** - Lower priority&lt;br /&gt;
   - Could include observing returned physical credentials (ID badges, access cards)&lt;br /&gt;
   - Less directly relevant than other evidence types for this specific objective&lt;br /&gt;
&lt;br /&gt;
== Assessment Approaches Prioritization ==&lt;br /&gt;
&lt;br /&gt;
1. **Test (C3)** - Highest priority&lt;br /&gt;
   - Testing mechanisms for disabling system access&lt;br /&gt;
   - Testing processes for revoking authenticators&lt;br /&gt;
   - This approach directly demonstrates that system access termination works as intended&lt;br /&gt;
   - Focus on objects in D3: &amp;quot;mechanisms supporting or implementing personnel transfer and termination notifications; mechanisms for disabling system access and revoking authenticators&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. **Examine (C1)** - Secondary priority&lt;br /&gt;
   - Review records of personnel transfer/termination actions&lt;br /&gt;
   - Examine lists of system accounts and their status&lt;br /&gt;
   - Review records of terminated authenticators/credentials&lt;br /&gt;
   - These provide evidence of consistent implementation&lt;br /&gt;
&lt;br /&gt;
3. **Interview (C2)** - Tertiary priority&lt;br /&gt;
   - Interviews with account managers and system administrators&lt;br /&gt;
   - These validate understanding of requirements and procedures&lt;br /&gt;
   - Can help clarify inconsistencies found during testing or examination&lt;br /&gt;
&lt;br /&gt;
== Recommendation for Objective [b] ==&lt;br /&gt;
&lt;br /&gt;
I recommend you:&lt;br /&gt;
&lt;br /&gt;
1. First perform tests of the actual mechanisms used to terminate access and credentials&lt;br /&gt;
2. Examine records of past terminations/transfers to verify consistent implementation&lt;br /&gt;
3. Interview key personnel to confirm understanding of requirements&lt;br /&gt;
&lt;br /&gt;
Since objective [b] focuses on whether &amp;quot;system access and credentials are terminated consistent with personnel actions,&amp;quot; your strongest evidence will come from demonstrations that the process works correctly and artifacts showing it has been followed consistently in actual personnel actions.&lt;/div&gt;</summary>
		<author><name>David</name></author>
	</entry>
</feed>