Process Identification List
To be able to identify rogue or unauthorized activity in your organization’s systems, you first have to know what activity is authorized. That includes creating a list of authorized user accounts (see here for that list), and also creating a list of those times when an application is authorized to do something on behalf of a user, like performing a software update or making a backup of files. The template below helps you track the applications and other processes that are authorized to act on behalf of a user.
Creation of this template was generously sponsored by:
All templates and other information provided by the CMMC Information Institute are provided as-is and without any warranties, express or implied, including any warranty of merchantability and warranty of fitness for a particular purpose.