Mechanisms exist to enforce configuration restrictions in an effort to restrict the ability of users to conduct unauthorized changes.
Control Question
Assessment question for control validation
Does the organization enforce configuration restrictions in an effort to restrict the ability of users to conduct unauthorized changes?
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 2 - Operational
Tier 3 - Tactical
Core Control Designations
Special designations and baseline inclusions
MAD: CHG-04
ESP Level 1: CHG-04
ESP Level 2: CHG-04
ESP Level 3: CHG-04