💼 AC-2 Account Management
- ID:
/frameworks/nist-sp-800-53-r5/ac/02
Description
a. Define and document the types of accounts allowed and specifically prohibited for use within the system; b. Assign account managers; c. Require [Assignment: organization-defined prerequisites and criteria] for group and role membership; d. Specify:
- Authorized users of the system;
- Group and role membership; and
- Access authorizations (i.e., privileges) and [Assignment: organization-defined attributes (as required)] for each account; e. Require approvals by [Assignment: organization-defined personnel or roles] for requests to create accounts; f. Create, enable, modify, disable, and remove accounts in accordance with [Assignment: organization-defined policy, procedures, prerequisites, and criteria]; g. Monitor the use of accounts; h. Notify account managers and [Assignment: organization-defined personnel or roles] within:
- [Assignment: organization-defined time period] when accounts are no longer required;
- [Assignment: organization-defined time period] when users are terminated or transferred; and
- [Assignment: organization-defined time period] when system usage or need-to-know changes for an individual; i. Authorize access to the system based on:
- A valid access authorization;
- Intended system usage; and
- [Assignment: organization-defined attributes (as required)]; j. Review accounts for compliance with account management requirements [Assignment: organization-defined frequency]; k. Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group; and l. Align account management processes with personnel termination and transfer processes.
Similar
- Sections
/frameworks/aws-fsbp-v1.0.0/dms/10/frameworks/aws-fsbp-v1.0.0/eventbridge/03/frameworks/aws-fsbp-v1.0.0/iam/01/frameworks/aws-fsbp-v1.0.0/iam/02/frameworks/aws-fsbp-v1.0.0/iam/08/frameworks/aws-fsbp-v1.0.0/iam/21/frameworks/aws-fsbp-v1.0.0/kms/01/frameworks/aws-fsbp-v1.0.0/kms/02
- Internal
- ID:
dec-c-edf2e320
- ID:
Similar Sections (Take Policies From)
Similar Sections (Give Policies To)
Sub Sections
Policies (4)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS IAM Policy allows full administrative privileges🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User has inline or directly attached policies🟢 | 1 | 🟠 x1, 🟢 x5 | no data |
| 🛡️ AWS IAM User with credentials unused for 45 days or more is not disabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Instance OS Login is not enabled🟢 | 1 | 🟢 x6 | no data |