Skip to main content

πŸ’Ό AC-6 Least Privilege (M)(H)

  • Contextual name: πŸ’Ό AC-6 Least Privilege (M)(H)
  • ID: /frameworks/fedramp-high-security-controls/ac/06
  • Located in: πŸ’Ό Access Control

Description​

Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.

Similar​

  • Sections
    • /frameworks/nist-sp-800-53-r5/ac/06
  • Internal
    • ID: dec-c-e3bc71a5

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-6 Least Privilege102126

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AC-6 Least Privilege (M)(H)633

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AC-6(1) Authorize Access to Security Functions (M)(H)44
πŸ’Ό AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H)14
πŸ’Ό AC-6(3) Network Access to Privileged Commands (H)12
πŸ’Ό AC-6(5) Privileged Accounts (M)(H)35
πŸ’Ό AC-6(7) Review of User Privileges (M)(H)22
πŸ’Ό AC-6(8) Privilege Levels for Code Execution (H)
πŸ’Ό AC-6(9) Log Use of Privileged Functions (M)(H)723
πŸ’Ό AC-6(10) Prohibit Non-privileged Users from Executing Privileged Functions (M)(H)13

Policies (7)​

PolicyLogic CountFlags
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6
πŸ“ AWS EC2 Instance IMDSv2 is not enabled 🟒1🟒 x6
πŸ“ AWS IAM Policy allows full administrative privileges 🟒1🟒 x6
πŸ“ AWS IAM User has inline or directly attached policies 🟒1🟠 x1, 🟒 x5
πŸ“ AWS IAM User with credentials unused for 45 days or more is not disabled 🟒1🟒 x6
πŸ“ AWS RDS Snapshot is publicly accessible 🟒1🟒 x6
πŸ“ AWS S3 Bucket is not configured to block public access 🟒1🟒 x6