AC-5—Separation of Duties
>Control Description
Identify and document ⚙organization-defined duties of individuals requiring separation; and
Define system access authorizations to support separation of duties.
>FedRAMP Baseline Requirements
Additional Requirements and Guidance
AC-5 Guidance: CSPs have the option to provide a separation of duties matrix as an attachment to the SSP.
>Discussion
Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or business functions and support functions among different individuals or roles, conducting system support functions with different individuals, and ensuring that security personnel who administer access control functions do not also administer audit functions. Because separation of duty violations can span systems and application domains, organizations consider the entirety of systems and system components when developing policy on separation of duties.
Separation of duties is enforced through the account management activities in AC-2, access control mechanisms in AC-3, and identity management activities in IA-2, IA-4, and IA-12.
>Cross-Framework Mappings
>Programmatic Queries
Related Services
CLI Commands
aws iam list-entities-for-policy --policy-arn arn:aws:iam::aws:policy/AdministratorAccessaws iam list-attached-user-policies --user-name USERNAMEaws organizations list-policies --filter SERVICE_CONTROL_POLICYaws iam list-users --query 'Users[?PermissionsBoundary]'>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of AC-5 (Separation Of Duties)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring AC-5?
- •How frequently is the AC-5 policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to AC-5?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce AC-5 requirements.
- •What automated tools, systems, or technologies are deployed to implement AC-5?
- •How is AC-5 integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce AC-5 requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of AC-5?
- •What audit logs, records, reports, or monitoring data validate AC-5 compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of AC-5 effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate AC-5 compliance?
Ask AI
Configure your API key to use AI features.