3.1.15—Access Control - Derived
>Control Description
>Discussion
A privileged command is a human-initiated (interactively or via a process operating on behalf of the human) command executed on a system involving the control, monitoring, or administration of the system including security functions and associated security-relevant information. Security-relevant information is any information within the system that can potentially impact the operation of security functions or the provision of security services in a manner that could result in failure to enforce the system security policy or maintain isolation of code and data. Privileged commands give individuals the ability to execute sensitive, security-critical, or security-relevant system functions.
Controlling such access from remote locations helps to ensure that unauthorized individuals are not able to execute such commands freely with the potential to do serious or catastrophic damage to organizational systems. Note that the ability to affect the integrity of the system is considered security-relevant as that could enable the means to by-pass security functions although not directly impacting the function itself.
>Cross-Framework Mappings
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies govern authorization of remote access before connection?
- •What approval workflow exists for remote access requests?
- •How do you verify authorization prior to granting remote access?
- •Who has authority to approve different types of remote access?
- •What procedures handle emergency remote access requests?
Technical Implementation:
- •How do you technically enforce authorization checks before remote connection?
- •What pre-authentication mechanisms verify user identity and authorization?
- •How are remote access control lists maintained and enforced?
- •What systems prevent unauthorized remote access attempts?
- •How do you implement network access control (NAC) for remote devices?
Evidence & Documentation:
- •Can you show remote access authorization approvals?
- •What logs demonstrate pre-connection authorization checks?
- •Can you provide evidence of denied unauthorized remote access?
- •What documentation tracks current authorized remote users?
- •What audit trails verify authorization before remote connection?
Ask AI
Configure your API key to use AI features.