🕸️ Ada Research Browser

AC.L2-3.1.20-Evidence.md
← Back

Evidence – AC.L2-3.1.20

Verify and Control Connections to External Systems


Control Overview

This document describes the evidence used to demonstrate implementation of AC.L2-3.1.20, which requires verification and control of connections to external systems.

This evidence supports the control response documented in the System Security Plan (SSP).


Evidence Objectives

Evidence for this control demonstrates that:


Evidence Artifacts

1. External Connection Controls

Evidence demonstrating controlled external connections may include:

Examples of acceptable sources:


Evidence Retention

Evidence supporting this control is retained in accordance with organizational policy and contractual requirements and is available for review during assessment.


Notes

External system connections must be explicitly approved and controlled to prevent unauthorized data exchange.