Skip to content

3.4.5 — Lock Down Change Access

Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.

Only authorized people can make changes — and the restriction is defined, documented, approved, and technically enforced. This requirement covers both physical and logical access to the systems being changed.

Eight things are assessed — four for physical access and four for logical access. For each type:

  1. Defined. Who is authorized to make changes? A named list of people or specific roles.
  2. Documented. The authorization is written down — not tribal knowledge.
  3. Approved. An appropriate authority (system owner, security lead) signed off on the access.
  4. Enforced. Technical controls actually prevent unauthorized people from making changes. Policy alone doesn’t count.

Physical access means restricting who can physically touch CUI systems — server rooms, network closets, data centers. If a change requires racking a server or swapping a drive, only authorized personnel should have physical access.

Logical access means restricting who can remotely modify CUI systems — admin consoles, deployment tools, configuration interfaces. Not every IT person should have write access to production. Use least privilege: separate admin accounts, Privileged Identity Management (PIM), and just-in-time access elevation.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Are physical access restrictions for changes defined?Named list of who can physically access CUI infrastructure
2Are physical access restrictions documented?Written documentation — not verbal
3Are physical access restrictions approved?Signed off by system owner or security lead
4Are physical access restrictions enforced?Badge access, locked server room, escorted visitor policy — technically enforced
5Are logical access restrictions for changes defined?Named list of who has admin/write access to CUI systems
6Are logical access restrictions documented?Written documentation of who has what level of access
7Are logical access restrictions approved?Approved by system owner or security lead
8Are logical access restrictions enforced?RBAC, PIM, separate admin accounts — technically enforced

Documents they’ll review: Configuration management policy; procedures addressing access restrictions for system changes; system security plan; list of personnel authorized for physical changes; list of personnel authorized for logical changes; access approvals; change control records showing who implemented each change

People they’ll talk to: Personnel with logical access control responsibilities; personnel with physical access control responsibilities; information security personnel; system or network administrators

Live demos they’ll ask for: “Who can access the server room? Show me the badge access list.” “Log in as a general IT user and try to modify a CUI server config — show me it’s blocked.” “Show me the PIM elevation process for admin access.”


These are the actual questions. Have answers ready.

  • “Who is authorized to make physical changes to CUI systems? Show me the list.”
  • “Who is authorized to make logical changes? Is this list different from general IT staff?”
  • “Are these authorizations approved and documented? By whom?”
  • “Log in as a standard IT user — can you modify production? Show me the block.”
  • “Does your change documentation include the name of the person who made the change?”
  • “How do you handle external technicians who need physical access? Show me the process.”

Too many people with change access. Every IT person has admin rights to every system. The assessor asks “how many people can modify this server?” and the answer is twelve. Restrict production change access to the minimum — use PIM for just-in-time elevation.

No documentation. People have access but there’s no record of who or why. The assessor asks “show me the approved list of people authorized to make changes” and it doesn’t exist. Maintain a documented, approved list.

Policy without enforcement. Policy says only senior admins make production changes, but the technical controls don’t enforce it. A junior admin can log in and modify anything. RBAC and PIM must enforce the restriction, not just policy.

Physical access uncontrolled. Server room door propped open, no badge access, visitors unescorted. Physical access to CUI infrastructure must be as controlled as logical access.



RequirementWhy it matters here
3.4.3 — Control Every ChangeThe change management process that these access restrictions support
3.1.5 — Separate DutiesSeparation of duties applied to change implementation
3.1.7 — No Shared Accounts for AdminAdmin accounts used for changes must be unique per person
3.10.1 — Control Physical AccessPhysical access restrictions to CUI infrastructure

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: CM.L2-3.4.5 | SPRS Weight: 5 points | POA&M Eligible: No