AC-6(5)—Least Privilege | Privileged Accounts
>Control Description
>DoD Impact Level Requirements
No specific parameter values or requirements for this impact level.
>Discussion
Privileged accounts, including super user accounts, are typically described as system administrator for various types of commercial off-the-shelf operating systems. Restricting privileged accounts to specific personnel or roles prevents day-to-day users from accessing privileged information or privileged functions. Organizations may differentiate in the application of restricting privileged accounts between allowed privileges for local accounts and for domain accounts provided that they retain the ability to control system configurations for key parameters and as otherwise necessary to sufficiently mitigate risk.
>Programmatic Queries
Related Services
CLI Commands
aws iam list-entities-for-policy --policy-arn arn:aws:iam::aws:policy/AdministratorAccess --entity-filter Useraws iam list-entities-for-policy --policy-arn arn:aws:iam::aws:policy/AdministratorAccess --entity-filter Roleaws cloudtrail lookup-events --lookup-attributes AttributeKey=Username,AttributeValue=root --max-results 10aws iam list-attached-group-policies --group-name AdminGroup>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of AC-6(5) (Privileged Accounts)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring AC-6(5)?
- •How frequently is the AC-6(5) policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to AC-6(5)?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce AC-6(5) requirements.
- •What automated tools, systems, or technologies are deployed to implement AC-6(5)?
- •How is AC-6(5) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce AC-6(5) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of AC-6(5)?
- •What audit logs, records, reports, or monitoring data validate AC-6(5) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of AC-6(5) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate AC-6(5) compliance?
Ask AI
Configure your API key to use AI features.