Under active development Content is continuously updated and improved

AC-2Account Management

>Control Description

a

Define and document the types of accounts allowed and specifically prohibited for use within the system;

b

Assign account managers;

c

Require conditions for group and role membership;

d

Specify: Attribute Name Email Address Text Employer Name Federation Id Given Name Identity Provider Id Sur Name Telephone Number Identity Provider Id Unique Subject Id Counter Terrorism Data Self Search Home Privilege Indicator Criminal History Data Self Search Home Privilege Indicator Criminal Intelligence Data Self Search Home Privilege Indicator Criminal Investigative Data Self Search Home Privilege Indicator Display Name Government Data Self Search Home Privilege Indicator Local Id NCIC Certification Indicator N-DEx Privilege Indicator PCII Certification Indicator 28 CFR Certification Indicator Employer ORI Employer Organization General Category Code Employer State Code Public Safety Officer Indicator Sworn Law Enforcement Officer Indicator Authenticator Assurance Level Federation Assurance Level Identity Assurance Level Intelligence Analyst Indicator

1.

Authorized users of the system;

2.

Group and role membership; and

3.

Access authorizations (i.e., privileges) and attributes listed for each account;

e

Require approvals by organizational personnel with account management responsibilities for requests to create accounts;

f

Create, enable, modify, disable, and remove accounts in accordance with agency policy;

g

Monitor the use of accounts;

h

Notify account managers and system/network administrators within: 3

1.

One day when accounts are no longer required;

2.

One day when users are terminated or transferred; and

3.

One day when system usage or need-to-know changes for an individual;

i

Authorize access to the system based on:

1.

A valid access authorization;

2.

Intended system usage; and

3.

Attributes as listed in AC-2(d)(3); 3

j

Review accounts for compliance with account management requirements at least annually;

k

Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group; and

l

Align account management processes with personnel termination and transfer processes.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.