Enforce access restrictions using automated mechanisms ; and Automatically generate audit records of the enforcement actions.
Organizations log system accesses associated with applying configuration changes to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes.
access restrictions for change are enforced using automated mechanisms; audit records of enforcement actions are automatically generated.
No cross-framework mappings available