CM-5—Access Restrictions For Change
>Control Description
Enterprises should ensure that requirements regarding physical and logical access restrictions for changes to the information systems and networks are defined and included in the enterprise’s implementation of access restrictions. Examples include access restriction for changes to centrally managed processes for software component updates and the deployment of updates or patches.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.