AC-06 Least Privilege
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.
Baselines
- L
- M
- H
- P
Guidance
Organizations employ least privilege for specific duties and systems. The principle of least privilege is also applied to system processes, ensuring that the processes have access to systems and operate at privilege levels no higher than necessary to accomplish organizational missions or business functions. Organizations consider the creation of additional processes, roles, and accounts as necessary to achieve least privilege. Organizations apply least privilege to the development, implementation, and operation of organizational systems.
Control Enhancements 10
- AC-06(01) Authorize Access to Security Functions L M H P
- AC-06(02) Non-privileged Access for Nonsecurity Functions L M H P
- AC-06(03) Network Access to Privileged Commands L M H P
- AC-06(04) Separate Processing Domains L M H P
- AC-06(05) Privileged Accounts L M H P
- AC-06(06) Privileged Access by Non-organizational Users L M H P
- AC-06(07) Review of User Privileges L M H P
- AC-06(08) Privilege Levels for Code Execution L M H P
- AC-06(09) Log Use of Privileged Functions L M H P
- AC-06(10) Prohibit Non-privileged Users from Executing Privileged Functions L M H P
Related controls 12
- AC-02 Account Management L M H P
- AC-03 Access Enforcement L M H P
- AC-05 Separation of Duties L M H P
- AC-16 Security and Privacy Attributes L M H P
- CM-05 Access Restrictions for Change L M H P
- CM-11 User-installed Software L M H P
- PL-02 System Security and Privacy Plans L M H P
- PM-12 Insider Threat Program L M H P
- SA-08 Security and Privacy Engineering Principles L M H P
- SA-15 Development Process, Standards, and Tools L M H P
- SA-17 Developer Security and Privacy Architecture and Design L M H P
- SC-38 Operations Security L M H P