3.1.2 — What They Can Do
What It Says
Section titled “What It Says”Limit system access to the types of transactions and functions that authorized users are permitted to execute.
What It Actually Means
Section titled “What It Actually Means”Define roles. Assign permissions to roles, not to people. Then assign people to roles.
A contract manager gets read access to CUI documents — not delete. An engineer gets write access to technical data — not financial records. A receptionist doesn’t get access to the engineering file share.
This is role-based access control (RBAC). Where 3.1.1 controls who gets in, this controls what they can do once inside. The system enforces it technically, not just through policy.
Pass or Fail
Section titled “Pass or Fail”Your assessor needs a “yes” to every row:
| # | Question | What “yes” looks like |
|---|---|---|
| 1 | Are permitted transactions and functions defined per role? | Documented role definitions with specific permissions |
| 2 | Does the system enforce those limits? | A user in one role can’t perform functions from another role — prove it |
What to Have Ready on Assessment Day
Section titled “What to Have Ready on Assessment Day”Documents they’ll review: Access control policy, access enforcement procedures, system security plan, list of role-based authorizations, system configuration showing permissions, audit logs
People they’ll talk to: Access enforcement staff, sysadmins, information security lead, system developers
Live demos they’ll ask for: “Log in as a standard user and try to access an admin function — show me it’s blocked.”
The Assessor’s Playbook
Section titled “The Assessor’s Playbook”These are the actual questions. Have answers ready.
- “Show me your role definitions — how do you determine what each role can do?”
- “Are access control lists used to limit access based on role?”
- “Can you demonstrate that a restricted user is actually blocked from unauthorized functions?”
- “How do you handle temporary elevated access?”
Where Companies Trip Up
Section titled “Where Companies Trip Up”Everyone is an admin. Small companies give all users admin rights for convenience. This is the fastest way to fail.
Roles on paper but not in the system. Having a policy document that describes roles but not configuring the system to enforce them.
Privilege creep. Users accumulate permissions as they move between projects. Old permissions never get revoked. Run quarterly access reviews.
Over-permissioned service accounts. An automated process running as domain admin when it only needs read access to one database.
How to Talk About This
Section titled “How to Talk About This”Connected Requirements
Section titled “Connected Requirements”| Requirement | Why it matters here |
|---|---|
| 3.1.1 — Who Gets In | Controls who gets in; this controls what they do |
| 3.1.5 — Minimum Necessary | The principle behind this: least privilege |
| 3.1.7 — Log the Admin Work | Specifically controls and logs privileged functions |
Implementation
Section titled “Implementation”Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.
Start a conversation →CMMC Practice ID: AC.L2-3.1.2 | SPRS Weight: 5 points | POA&M Eligible: No