Skip to main content

πŸ’Ό AC-6(2) Least Privilege | Non-privileged Access for Nonsecurity Functions

  • Contextual name: πŸ’Ό AC-6(2) Least Privilege | Non-privileged Access for Nonsecurity Functions
  • ID: /frameworks/nist-sp-800-53-r5/ac/06/02
  • Located in: πŸ’Ό AC-6 Least Privilege

Description​

Require that users of system accounts (or roles) with access to [Assignment: organization-defined security functions or security-relevant information] use non-privileged accounts or roles, when accessing nonsecurity functions.

Similar​

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/efs/04
    • /frameworks/aws-fsbp-v1.0.0/iam/01
    • /frameworks/aws-fsbp-v1.0.0/iam/04
    • /frameworks/aws-fsbp-v1.0.0/iam/21
    • /frameworks/aws-fsbp-v1.0.0/sagemaker/03
  • Internal
    • ID: dec-c-738dc0bf

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [EFS.4] EFS access points should enforce a user identity
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [IAM.1] IAM policies should not allow full "*" administrative privileges11
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [IAM.4] IAM root user access key should not exist11
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [IAM.21] IAM customer managed policies that you create should not allow wildcard actions for services
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [SageMaker.3] Users should not have root access to SageMaker AI notebook instances

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H)14

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (4)​

PolicyLogic CountFlags
πŸ“ AWS Account Root User credentials were used is the last 30 days πŸ”΄πŸŸ’1πŸ”΄ x1, 🟒 x6
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6
πŸ“ AWS IAM Policy allows full administrative privileges 🟒1🟒 x6
πŸ“ AWS IAM User with console and programmatic access set during the initial creation 🟒🟒 x3

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-0a7801fb1
βœ‰οΈ dec-x-157aa4b91
βœ‰οΈ dec-x-b10e98af1
βœ‰οΈ dec-x-e58fd8e01