CM-5 Access Restrictions for Change

Control: Enforces access restrictions associated with changes to the system.

Illustrative Controls and TIBCO LogLogic Solution

User access rights to systems and data should be in line with defined and documented business needs and job requirements. Accurately managing user access rights addresses the issues of unintended or malicious modifications of data. Deficiencies in this area might allow unauthorized modifications that could lead to errors in reporting.

To satisfy this control objective, administrators must periodically review the user access to files and programs to ensure the users have not accessed items outside of their role. Administrators should select a sample of users who have logged in to reporting servers and review their access for appropriateness based upon their job functions.

Administrators must monitor and verify that all user access to programs and data. Review this access to ensure that there is a segregation of duties, as well as all access privileges are properly assigned and approved.

Reports and Alerts

Use the following reference to see the CM-5 reports and alerts: CM-5.