Skip to main content

💼 AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H)

  • ID: /frameworks/fedramp-moderate-security-controls/ac/06/02

Description

Require that users of system accounts (or roles) with access to [FedRAMP Assignment: all security functions] use non-privileged accounts or roles, when accessing nonsecurity functions. AC-6 (2) Additional FedRAMP Requirements and Guidance: Guidance: Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.

Similar

  • Sections
    • /frameworks/fedramp-high-security-controls/ac/06/02
  • Internal
    • ID: dec-c-9da6a6b7

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 FedRAMP High Security Controls → 💼 AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H)15no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (5)

PolicyLogic CountFlagsCompliance
🛡️ AWS Account Root User credentials were used is the last 30 days🟢1🟢 x6no data
🛡️ AWS Account Root User has active access keys🟢1🟢 x6no data
🛡️ AWS IAM Policy allows full administrative privileges🟢1🟢 x6no data
🛡️ AWS IAM User has inline or directly attached policies🟢1🟠 x1, 🟢 x5no data
🛡️ AWS IAM User with console and programmatic access set during the initial creation🟢⚪🟢 x2, ⚪ x1no data