Under active development Content is continuously updated and improved

AC-2 (13)Account Management | Disable Accounts for High-risk Individuals

Moderate
High

>Control Description

Disable accounts of individuals within organization-defined time period of discovery of organization-defined significant risks.

>FedRAMP Baseline Requirements

No FedRAMP-specific parameter values or requirements for this baseline.

>Discussion

Users who pose a significant security and/or privacy risk include individuals for whom reliable evidence indicates either the intention to use authorized access to systems to cause harm or through whom adversaries will cause harm. Such harm includes adverse impacts to organizational operations, organizational assets, individuals, other organizations, or the Nation. Close coordination among system administrators, legal staff, human resource managers, and authorizing officials is essential when disabling system accounts for high-risk individuals.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of AC-2(13) (Disable Accounts For High-Risk Individuals)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring AC-2(13)?
  • How frequently is the AC-2(13) policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to AC-2(13)?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce AC-2(13) requirements.
  • What automated tools, systems, or technologies are deployed to implement AC-2(13)?
  • How is AC-2(13) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce AC-2(13) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of AC-2(13)?
  • What audit logs, records, reports, or monitoring data validate AC-2(13) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of AC-2(13) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate AC-2(13) compliance?

Ask AI

Configure your API key to use AI features.