Skip to main content

πŸ’Ό AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H)

  • Contextual name: πŸ’Ό AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H)
  • ID: /frameworks/fedramp-high-security-controls/ac/06/02
  • Located in: πŸ’Ό AC-6 Least Privilege (M)(H)

Description​

Require that users of system accounts (or roles) with access to [FedRAMP Assignment: all security functions] use non-privileged accounts or roles, when accessing nonsecurity functions. AC-6 (2) Additional FedRAMP Requirements and Guidance: Guidance: Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.

Similar​

  • Sections
    • /frameworks/nist-sp-800-53-r5/ac/06/02
  • Internal
    • ID: dec-c-9da6a6b7

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-6(2) Least Privilege _ Non-privileged Access for Nonsecurity Functions44

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H)4

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (4)​

PolicyLogic CountFlags
πŸ“ AWS Account Root User credentials were used is the last 30 days πŸ”΄πŸŸ’1πŸ”΄ x1, 🟒 x6
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6
πŸ“ AWS IAM Policy allows full administrative privileges 🟒1🟒 x6
πŸ“ AWS IAM User with console and programmatic access set during the initial creation 🟒🟒 x3

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-157aa4b91