Under active development Content is continuously updated and improved

AC-2Account Management

LI-SaaS
Low
Moderate
High

>Control Description

a

Define and document the types of accounts allowed and specifically prohibited for use within the system;

b

Assign account managers;

c

Require organization-defined prerequisites and criteria for group and role membership;

d

Specify:

1.

Authorized users of the system;

2.

Group and role membership; and

3.

Access authorizations (i.e., privileges) and organization-defined attributes (as required) for each account;

e

Require approvals by organization-defined personnel or roles for requests to create accounts;

f

Create, enable, modify, disable, and remove accounts in accordance with organization-defined policy, procedures, prerequisites, and criteria;

g

Monitor the use of accounts;

h

Notify account managers and organization-defined personnel or roles within:

1.

organization-defined time period when accounts are no longer required;

2.

organization-defined time period when users are terminated or transferred; and

3.

organization-defined time period when system usage or need-to-know changes for an individual;

i

Authorize access to the system based on:

1.

A valid access authorization;

2.

Intended system usage; and

3.

organization-defined attributes (as required);

j

Review accounts for compliance with account management requirements organization-defined frequency;

k

Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group; and

l

Align account management processes with personnel termination and transfer processes.

>FedRAMP Baseline Requirements

Parameter Values

h
1.
twenty-four (24) hours
2.
eight (8) hours
3.
eight (8) hours
j
monthly for privileged accessed, every six (6) months for non-privileged access

>Discussion

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specification of access privileges reflect the requirements in other controls in the security plan. Users requiring administrative privileges on system accounts receive additional scrutiny by organizational personnel responsible for approving such accounts and privileged access, including system owner, mission or business owner, senior agency information security officer, or senior agency official for privacy.

Types of accounts that organizations may wish to prohibit due to increased risk include shared, group, emergency, anonymous, temporary, and guest accounts. Where access involves personally identifiable information, security programs collaborate with the senior agency official for privacy to establish the specific conditions for group and role membership; specify authorized users, group and role membership, and access authorizations for each account; and create, adjust, or remove system accounts in accordance with organizational policies. Policies can include such information as account expiration dates or other factors that trigger the disabling of accounts.

Organizations may choose to define access privileges or other attributes by account, type of account, or a combination of the two. Examples of other attributes required for authorizing access include restrictions on time of day, day of week, and point of origin. In defining other system account attributes, organizations consider system-related requirements and mission/business requirements.

Failure to consider these factors could affect system availability. Temporary and emergency accounts are intended for short-term use. Organizations establish temporary accounts as part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation.

Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts, including local logon accounts used for special tasks or when network resources are unavailable (may also be known as accounts of last resort).

Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include when shared/group, emergency, or temporary accounts are no longer required and when individuals are transferred or terminated. Changing shared/group authenticators when members leave the group is intended to ensure that former group members do not retain access to the shared or group account.

Some types of system accounts may require specialized training.

>Cross-Framework Mappings

>Programmatic Queries

Beta

Related Services

IAM
AWS Organizations
IAM Identity Center

CLI Commands

List all IAM users
aws iam list-users
Get detailed account authorization info
aws iam get-account-authorization-details
List accounts in organization
aws organizations list-accounts
Check for inactive users (90+ days)
aws iam generate-credential-report && aws iam get-credential-report

>Relevant Technologies

Technology-specific guidance with authoritative sources and verification commands.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of AC-2 (Account Management)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring AC-2?
  • How frequently is the AC-2 policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to AC-2?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce AC-2 requirements.
  • What automated tools, systems, or technologies are deployed to implement AC-2?
  • How is AC-2 integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce AC-2 requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of AC-2?
  • What audit logs, records, reports, or monitoring data validate AC-2 compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of AC-2 effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate AC-2 compliance?

Ask AI

Configure your API key to use AI features.