Mechanisms exist to define, document, approve and enforce access restrictions associated with changes to systems.
Does the organization define, document, approve and enforce access restrictions associated with changes to systems?