NIST 800-53 REV 5 • SYSTEM AND INFORMATION INTEGRITY

SI-4(6)Restrict Non-privileged Users

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Restrict who can access monitoring tools and data — non-privileged users should not be able to see security alerts or tamper with monitoring configurations.

Example 1: Use role-based access control in your SIEM to limit who can view security events, create/modify detection rules, and access incident data. Regular IT staff get read-only access to their systems' logs. Only your security team gets full access to all events and configuration.

Example 2: In Microsoft Sentinel, use Azure RBAC to control access. Assign the "Microsoft Sentinel Reader" role to operations staff and "Microsoft Sentinel Contributor" only to your security analysts. Audit who has access to the SIEM workspace quarterly.