<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_PS.L2-3.9.2.c</id>
	<title>LLMResponse PS.L2-3.9.2.c - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://cmmcwiki.org/index.php?action=history&amp;feed=atom&amp;title=LLMResponse_PS.L2-3.9.2.c"/>
	<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_PS.L2-3.9.2.c&amp;action=history"/>
	<updated>2026-04-20T07:11:36Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://cmmcwiki.org/index.php?title=LLMResponse_PS.L2-3.9.2.c&amp;diff=1416&amp;oldid=prev</id>
		<title>David: Created page with &quot;For the assessment objective &quot;[c] the system is protected during and after personnel transfer actions,&quot; I&#039;ll rank the evidence types and prioritize assessment approaches based on the CMMC Level 2 guidance provided.  == Evidence Types Ranking for Assessment Objective [c] ==  1. **Artifacts (I1)** - Highest priority    - System logs showing access modifications during/after transfers    - Records of access rights adjustments for transferred personnel    - Documentation of...&quot;</title>
		<link rel="alternate" type="text/html" href="https://cmmcwiki.org/index.php?title=LLMResponse_PS.L2-3.9.2.c&amp;diff=1416&amp;oldid=prev"/>
		<updated>2025-04-03T02:53:45Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;For the assessment objective &amp;quot;[c] the system is protected during and after personnel transfer actions,&amp;quot; I&amp;#039;ll rank the evidence types and prioritize assessment approaches based on the CMMC Level 2 guidance provided.  == Evidence Types Ranking for Assessment Objective [c] ==  1. **Artifacts (I1)** - Highest priority    - System logs showing access modifications during/after transfers    - Records of access rights adjustments for transferred personnel    - Documentation of...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;For the assessment objective &amp;quot;[c] the system is protected during and after personnel transfer actions,&amp;quot; I&amp;#039;ll rank the evidence types and prioritize assessment approaches based on the CMMC Level 2 guidance provided.&lt;br /&gt;
&lt;br /&gt;
== Evidence Types Ranking for Assessment Objective [c] ==&lt;br /&gt;
&lt;br /&gt;
1. **Artifacts (I1)** - Highest priority&lt;br /&gt;
   - System logs showing access modifications during/after transfers&lt;br /&gt;
   - Records of access rights adjustments for transferred personnel&lt;br /&gt;
   - Documentation of continued protection measures&lt;br /&gt;
   - These artifacts directly demonstrate protection maintained during transitions&lt;br /&gt;
&lt;br /&gt;
2. **Test (I4)** - High priority&lt;br /&gt;
   - Demonstrations of protection mechanisms during simulated transfers&lt;br /&gt;
   - Verification of continued security during role changes&lt;br /&gt;
   - Testing of access control mechanisms during transitions&lt;br /&gt;
   - This proves the effectiveness of protection measures&lt;br /&gt;
&lt;br /&gt;
3. **Documents (I2)** - Medium priority&lt;br /&gt;
   - Transfer procedures specifying protection requirements&lt;br /&gt;
   - Access control matrices showing appropriate changes&lt;br /&gt;
   - System security plans addressing personnel transitions&lt;br /&gt;
   - These establish the framework but don&amp;#039;t prove implementation&lt;br /&gt;
&lt;br /&gt;
4. **Physical Review (I3)** - Medium to lower priority&lt;br /&gt;
   - Observation of physical security measures during transfers&lt;br /&gt;
   - Verification of physical access control updates&lt;br /&gt;
   - This can be important if CUI is physically accessible&lt;br /&gt;
&lt;br /&gt;
== Assessment Approaches Prioritization ==&lt;br /&gt;
&lt;br /&gt;
1. **Test (C3)** - Highest priority&lt;br /&gt;
   - Testing organizational processes for personnel transfer&lt;br /&gt;
   - Verifying mechanisms supporting transfer notifications&lt;br /&gt;
   - Testing access modification procedures&lt;br /&gt;
   - This directly demonstrates system protection during transitions&lt;br /&gt;
   - Focus on objects in D3: &amp;quot;organizational processes for personnel transfer; mechanisms supporting transfer notifications&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. **Examine (C1)** - Secondary priority&lt;br /&gt;
   - Reviewing records of personnel transfer actions&lt;br /&gt;
   - Examining access control adjustments&lt;br /&gt;
   - Verifying protection measures remained in place&lt;br /&gt;
   - These provide evidence of consistent implementation&lt;br /&gt;
&lt;br /&gt;
3. **Interview (C2)** - Tertiary but still important priority&lt;br /&gt;
   - Interviews with system administrators handling transfers&lt;br /&gt;
   - Discussions with security personnel about transfer protections&lt;br /&gt;
   - Conversations with recently transferred employees&lt;br /&gt;
   - These validate understanding and implementation of requirements&lt;br /&gt;
&lt;br /&gt;
== Recommendation for Objective [c] ==&lt;br /&gt;
&lt;br /&gt;
I recommend you:&lt;br /&gt;
&lt;br /&gt;
1. First perform tests of the protection mechanisms during simulated transfer scenarios&lt;br /&gt;
2. Examine records of past transfers to verify systems remained protected&lt;br /&gt;
3. Interview both technical staff and transferred employees to validate protection measures&lt;br /&gt;
&lt;br /&gt;
Since objective [c] focuses on whether &amp;quot;the system is protected during and after personnel transfer actions,&amp;quot; your strongest evidence will come from demonstrations that protection measures remain effective during transitions and aren&amp;#039;t compromised during personnel changes.&lt;br /&gt;
&lt;br /&gt;
For this objective, you&amp;#039;ll want to specifically verify that:&lt;br /&gt;
- Access rights are appropriately modified rather than simply terminated&lt;br /&gt;
- Information remains accessible to authorized personnel during transitions&lt;br /&gt;
- Protection mechanisms continue functioning without interruption&lt;br /&gt;
- New roles receive appropriate access in a secure manner&lt;/div&gt;</summary>
		<author><name>David</name></author>
	</entry>
</feed>