AC-13 Supervision And Review -- Access Control

Access Control

Low Moderate High

Description

The organization supervises and reviews the activities of users with respect to the enforcement and usage of information system access controls.

Supplemental Guidance

The organization reviews audit records (e.g., user activity logs) for inappropriate activities in accordance with organizational procedures. The organization investigates any unusual information system-related activities and periodically reviews changes to access authorizations. The organization reviews more frequently the activities of users with significant information system roles and responsibilities. The extent of the audit record reviews is based on the FIPS 199 impact level of the information system. For example, for low-impact systems, it is not intended that security logs be reviewed frequently for every workstation, but rather at central points such as a web proxy or email servers and when specific circumstances warrant review of other audit records. NIST Special Publication 800-92 provides guidance on computer security log management.

Enhancements

(1) The organization employs automated mechanisms to facilitate the review of user activities.

Compliance Mappings

COBIT 2019

DSS05

ISO 42001:2023

A.6.2.6

NIS2 Directive

Art. 21(2)(i)

MAS TRM

9

BSI IT-Grundschutz

ORP.4

ANSSI

Hygiene.31Hygiene.6SecNumCloud.10.2

FINMA Circular 2023/1

IV.B.d(59)IV.B.d(60)

OSFI B-13

B-13.3.2B-13.3.3

EU GDPR

Art.32(1)(d)Art.5(1)(f)Art.5(2)

FISC Security Guidelines

FISC.T2

HKMA TM-E-1

TME1.8.1TME1.8.2

CBB TM

TM-6

Qatar NIA

AC

BOT Cyber Resilience

Ch2.2

CMMC 2.0

AC

FCA SYSC 13

SYSC 13.6.3

ISO 17799 (legacy)

10.10.211.2.4

COBIT 4.1 (legacy)

PO4.10