3.1.1 — Who Gets In
What It Says
Section titled “What It Says”Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
What It Actually Means
Section titled “What It Actually Means”You need three lists, and they need to be current:
- Every person who can log into your CUI systems — by name, not by team
- Every automated process (scheduled tasks, service accounts, API connections) — each one tied to a person who owns it
- Every device (workstations, phones, servers, printers) — each one approved and tracked
No shared logins. No mystery service accounts. No random laptops connecting to the network.
When someone leaves, their access dies the same day. When a device is decommissioned, it comes off the list. This is the foundation — everything else in Access Control builds on it.
Pass or Fail
Section titled “Pass or Fail”Your assessor needs a “yes” to every row:
| # | Question | What “yes” looks like |
|---|---|---|
| 1 | Are your authorized users identified? | A maintained list — not a stale spreadsheet from last year |
| 2 | Are your authorized processes identified? | Service accounts documented with an owner’s name |
| 3 | Are your authorized devices identified? | A device inventory from MDM or asset management |
| 4 | Is access actually limited to those users? | Unauthorized people can’t log in — prove it |
| 5 | Is access actually limited to those processes? | No rogue scripts or forgotten cron jobs |
| 6 | Is access actually limited to those devices? | Unregistered devices get blocked, not just logged |
What to Have Ready on Assessment Day
Section titled “What to Have Ready on Assessment Day”Documents they’ll review: Access control policy, account list with names, authorized device list, recent termination records, disabled account records, system audit logs
People they’ll talk to: Whoever manages accounts, your sysadmins, your security lead
Live demos they’ll ask for: “Show me how you create an account.” “Show me what happens when someone leaves.” “Plug in an unauthorized device — show me it’s blocked.”
The Assessor’s Playbook
Section titled “The Assessor’s Playbook”These are the actual questions. Have answers ready.
- “Show me your list of authorized users. How do you know it’s current?”
- “Walk me through what happens when someone leaves the company.”
- “How do you prevent unauthorized devices from connecting?”
- “Show me a recent example of a disabled account after a termination.”
- “Who owns this service account? What does it do?”
Where Companies Trip Up
Section titled “Where Companies Trip Up”Shared accounts. “[email protected]” used by three people. The assessor will ask who performed a specific action, and you won’t be able to answer.
Ghost accounts. Former employees still in Active Directory months after leaving. Run a quarterly access review — compare your user list against HR’s active employee list.
Orphan service accounts. That SQL service account from 2019 that nobody remembers creating. Every automated process needs a documented owner.
No device inventory. You know your users but you can’t list every device on the network. Your MDM or asset management tool is the answer.
How to Talk About This
Section titled “How to Talk About This”Connected Requirements
Section titled “Connected Requirements”| Requirement | Why it matters here |
|---|---|
| 3.5.1 — Prove Who You Are | Gives you the identity foundation this control depends on |
| 3.5.2 — Verify Before Entry | Verifies identity before granting the access you control here |
| 3.1.2 — What They Can Do | Once someone’s in, this limits what they can do |
| 3.9.2 — When People Leave | The offboarding process that feeds this control |
Implementation
Section titled “Implementation”Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.
Start a conversation →CMMC Practice ID: AC.L2-3.1.1 | SPRS Weight: 5 points | POA&M Eligible: No