🕸️ Ada Research Browser

AC.L2-3.1.1-Evidence.md
← Back

Evidence – AC.L2-3.1.1

Limit System Access to Authorized Users


Control Overview

This document describes the evidence used to demonstrate implementation of AC.L2-3.1.1, which requires system access to be limited to authorized users, processes, and authorized devices.

This evidence supports the control response documented in the System Security Plan (SSP).


Evidence Objectives

Evidence for this control demonstrates that:


Evidence Artifacts

1. Authorized User Accounts

Evidence demonstrating authorized users may include:

Examples of acceptable sources: - Microsoft Entra ID user directory - Google Workspace or Cloud Identity user directory - Other centralized identity provider user listings


2. Authentication Enforcement

Evidence demonstrating authentication controls may include:

Examples of acceptable sources: - Entra ID authentication or sign-in logs - Google Workspace login audit logs - Identity provider security reports


3. Authorized Devices

Evidence demonstrating authorized devices may include:

Examples of acceptable sources: - Microsoft Intune device inventory - Google Endpoint Management device list - Other managed device inventory systems


4. Access Review and Removal

Evidence demonstrating ongoing authorization may include:


Evidence Retention

Evidence supporting this control is retained in accordance with organizational policy and contractual requirements and is available for review during assessment.


Notes

This document identifies example evidence artifacts only. Organizations may use different tools or platforms provided the same objectives are met and evidence is available.