💼 AC-6(5) Privileged Accounts (M)(H)
- ID:
/frameworks/fedramp-high-security-controls/ac/06/05
Description
Restrict privileged accounts on the system to [Assignment: organization-defined personnel or roles].
Similar
- Sections
/frameworks/nist-sp-800-53-r5/ac/06/05
- Internal
- ID:
dec-c-e84263ed
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 NIST SP 800-53 Revision 5 → 💼 AC-6(5) Least Privilege _ Privileged Accounts | 3 | 3 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 FedRAMP Moderate Security Controls → 💼 AC-6(5) Privileged Accounts (M)(H) | 5 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (5)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS Account IAM Access Analyzer is not enabled for all regions🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Account Root User credentials were used is the last 30 days🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Account Root User has active access keys🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM Policy allows full administrative privileges🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User with console and programmatic access set during the initial creation🟢⚪ | 🟢 x2, ⚪ x1 | no data |
Internal Rules
| Rule | Policies | Flags |
|---|---|---|
| ✉️ dec-x-157aa4b9 | 1 | |
| ✉️ dec-x-ab7fc52e | 1 | |
| ✉️ dec-x-e58fd8e0 | 1 |