πΌ AC-2(7) Privileged User Accounts (M)(H)
- Contextual name: πΌ AC-2(7) Privileged User Accounts (M)(H)
- ID:
/frameworks/fedramp-moderate-security-controls/ac/02/07
- Located in: πΌ AC-2 Account Management (L)(M)(H)
Descriptionβ
(a) Establish and administer privileged user accounts in accordance with [Selection: Assignment: a role-based access scheme; an attribute-based access scheme];
(b) Monitor privileged role or attribute assignments;
(c) Monitor changes to roles or attributes; and
(d) Revoke access when privileged role or attribute assignments are no longer appropriate.
Similarβ
- Sections
/frameworks/fedramp-high-security-controls/ac/02/07
- Internal
- ID:
dec-c-e144afcf
- ID:
Similar Sections (Take Policies From)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ FedRAMP High Security Controls β πΌ AC-2(7) Privileged User Accounts (M)(H) | 6 | 7 |
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (7)β
Policy | Logic Count | Flags |
---|---|---|
π AWS Account IAM Access Analyzer is not enabled for all regions π’ | 1 | π’ x6 |
π AWS Account Root User credentials were used is the last 30 days π΄π’ | 1 | π΄ x1, π’ x6 |
π AWS EC2 Instance IAM role is not attached π’ | 1 | π’ x6 |
π AWS IAM Policy allows full administrative privileges π’ | 1 | π’ x6 |
π AWS IAM User has inline or directly attached policies π’ | 1 | π x1, π’ x5 |
π Azure Subscription Activity Log Alert for Create Policy Assignment does not exist π’ | 1 | π’ x6 |
π Azure Subscription Activity Log Alert for Delete Policy Assignment does not exist π’ | 1 | π’ x6 |