Mechanisms exist to limit access to security functions to explicitly-authorized privileged users.
Control Question
Assessment question for control validation
Does the organization limit access to security functions to explicitly-authorized privileged users?
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Core Control Designations
Special designations and baseline inclusions