LLMResponse CM.L2-3.4.5.h
I'll help you assess each objective for CM.L2-3.4.5 (Access Restrictions for Change) and prioritize the assessment approaches and evidence types for each objective.
Assessment Objective [h]: Logical access restrictions associated with changes to the system are enforced
Evidence Types Ranking:
1. **Screen Share**: Most valuable - direct observation of enforcement 2. **Artifacts**: Strong - system logs, access attempt records 3. **Documents**: Supporting - enforcement procedures 4. **Physical Review**: Limited value for logical controls
Assessment Approach Priority:
1. **Test**: Most important
- Test access control mechanisms - Try to perform changes with insufficient privileges - Verify system prevents unauthorized changes
2. **Screen Share**: Critical complement
- Observe login attempts with different privilege levels - Watch application of access controls in real-time
3. **Examine**: Important support
- Review system logs showing denied access attempts - Check audit trails of configuration changes
Each assessment objective requires a tailored approach with different emphasis on assessment methods and evidence types. The key is to ensure comprehensive coverage while focusing on the most relevant and efficient approaches for each specific objective.