🕸️ Ada Research Browser

AC.L2-3.1.7-Evidence.md
← Back

Evidence – AC.L2-3.1.7

Prevent Non-Privileged Users from Executing Privileged Functions


Control Overview

This document describes the evidence used to demonstrate implementation of AC.L2-3.1.7, which requires non-privileged users to be prevented from executing privileged functions.

This evidence supports the control response documented in the System Security Plan (SSP).


Evidence Objectives

Evidence for this control demonstrates that:


Evidence Artifacts

1. Privileged Role Assignments

Evidence demonstrating restriction of privileged functions may include:

Examples of acceptable sources:


2. Enforcement of Privileged Actions

Evidence demonstrating enforcement may include:


Evidence Retention

Evidence supporting this control is retained in accordance with organizational policy and contractual requirements and is available for review during assessment.


Notes

This document identifies example evidence artifacts only. Organizations may use different tools or platforms provided the same objectives are met and evidence is available.