BRACKETOLOGY | FEDRAMP
AC-6: LEAST PRIVILEGE
-
FedRAMP Baseline Membership AC-6:
- MODERATE
- HIGH
FedRAMP Bracketology
Use the FedRAMP Control Membership information above to determine if a control or control enhancement is required for each Impact Baseline — LOW, MODERATE, or HIGH
Click on the panel below each control or control enhancement to review the FedRAMP Impact Baseline-specific control configuration requirements for each of the [BRACKETS] in each control and/or control enhancement.
Review and use Additional Requirements and Guidance to build FedRAMP-compliant controls for your risk-based cybersecurity program.
To change the baseline view in the panel, click on LOW, MODERATE, or HIGH when the panel is open
Panels only appear where there are [BRACKETS] in the control or enhancement or where there is FedRAMP-specific requirements or guidance available.
The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
SUPPLEMENTAL GUIDANCE
Organizations employ least privilege for specific duties and information systems. The principle of least privilege is also applied to information system processes, ensuring that the processes operate at privilege levels no higher than necessary to accomplish required organizational missions/business functions. Organizations consider the creation of additional processes, roles, and information system accounts as necessary, to achieve least privilege. Organizations also apply least privilege to the development, implementation, and operation of organizational information systems.
RELATED CONTROLS: AC-6
CONTROL ENHANCEMENTS
AC-6 (1) LEAST PRIVILEGE | AUTHORIZE ACCESS TO SECURITY FUNCTIONS
-
FedRAMP Baseline Membership AC-6 (1):
- MODERATE
- HIGH
The organization explicitly authorizes access to [Assignment: organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information].
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
There are no FedRAMP-specific requirements if this control is used for a Low Impact system.
There are no FedRAMP-specific requirements if this control is used for a Moderate Impact system.
Explicitly authorize access to all functions not publicly accessible and all security-relevant information not publicly available.
Supplemental Guidance:
Security functions include, for example, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Security-relevant information includes, for example, filtering rules for routers/firewalls, cryptographic key management information, configuration parameters for security services, and access control lists. Explicitly authorized personnel include, for example, security administrators, system and network administrators, system security officers, system maintenance personnel, system programmers, and other privileged users.
RELATED CONTROLS: AC-6 (1)
AC-6 (2) LEAST PRIVILEGE | NON-PRIVILEGED ACCESS FOR NONSECURITY FUNCTIONS
-
FedRAMP Baseline Membership AC-6 (2):
- MODERATE
- HIGH
The organization requires that users of information system accounts, or roles, with access to [Assignment: organization-defined security functions or security-relevant information], use non-privileged accounts or roles, when accessing nonsecurity functions.
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
There are no FedRAMP-specific requirements if this control is used for a Low Impact system.
Require that users of information system accounts, or roles, with access to all security functions, use non-privileged accounts or roles, when accessing non-security functions.
FedRAMP Requirements and Guidance:
Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.
Require that users of information system accounts, or roles, with access to all security functions, use non-privileged accounts or roles, when accessing non-security functions.
FedRAMP Requirements and Guidance:
Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.
Supplemental Guidance:
This control enhancement limits exposure when operating from within privileged accounts or roles. The inclusion of roles addresses situations where organizations implement access control policies such as role-based access control and where a change of role provides the same degree of assurance in the change of access authorizations for both the user and all processes acting on behalf of the user as would be provided by a change between a privileged and non-privileged account.
RELATED CONTROLS: AC-6 (2)
AC-6 (3) LEAST PRIVILEGE | NETWORK ACCESS TO PRIVILEGED COMMANDS
-
FedRAMP Baseline Membership AC-6 (3):
- HIGH
The organization authorizes network access to [Assignment: organization-defined privileged commands] only for [Assignment: organization-defined compelling operational needs] and documents the rationale for such access in the security plan for the information system.
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
There are no FedRAMP-specific requirements if this control is used for a Low Impact system.
There are no FedRAMP-specific requirements if this control is used for a Moderate Impact system.
The organization authorizes network access to organization-defined privileged commands only for all privileged commands and documents the rationale for such access in the security plan for the information system.
Supplemental Guidance:
Network access is any access across a network connection in lieu of local access (i.e., user being physically present at the device).
RELATED CONTROLS: AC-6 (3)
AC-6 (4) LEAST PRIVILEGE | SEPARATE PROCESSING DOMAINS
The information system provides separate processing domains to enable finer-grained allocation of user privileges.
Supplemental Guidance:
Providing separate processing domains for finer-grained allocation of user privileges includes, for example: (i) using virtualization techniques to allow additional privileges within a virtual machine while restricting privileges to other virtual machines or to the underlying actual machine; (ii) employing hardware and/or software domain separation mechanisms; and (iii) implementing separate physical domains.
RELATED CONTROLS: AC-6 (4)
AC-6 (5) LEAST PRIVILEGE | PRIVILEGED ACCOUNTS
-
FedRAMP Baseline Membership AC-6 (5):
- MODERATE
- HIGH
The organization restricts privileged accounts on the information system to [Assignment: organization-defined personnel or roles].
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
There are no FedRAMP-specific requirements if this control is used for a Low Impact system.
There are no FedRAMP-specific requirements if this control is used for a Moderate Impact system.
There are no FedRAMP-specific requirements if this control is used for a High Impact system.
Supplemental Guidance:
Privileged accounts, including super user accounts, are typically described as system administrator for various types of commercial off-the-shelf operating systems. Restricting privileged accounts to specific personnel or roles prevents day-to-day users from having access to privileged information/functions. Organizations may differentiate in the application of this control enhancement between allowed privileges for local accounts and for domain accounts provided organizations retain the ability to control information system configurations for key security parameters and as otherwise necessary to sufficiently mitigate risk.
RELATED CONTROLS: AC-6 (5)
AC-6 (6) LEAST PRIVILEGE | PRIVILEGED ACCESS BY NON-ORGANIZATIONAL USERS
The organization prohibits privileged access to the information system by non-organizational users.
Supplemental Guidance: NONE
RELATED CONTROLS: AC-6 (6)
AC-6 (7) LEAST PRIVILEGE | REVIEW OF USER PRIVILEGES
-
FedRAMP Baseline Membership AC-6 (7):
- HIGH
The organization:
- (a) Reviews [Assignment: organization-defined frequency] the privileges assigned to [Assignment: organization-defined roles or classes of users] to validate the need for such privileges; and
- (b) Reassigns or removes privileges, if necessary, to correctly reflect organizational mission/business needs.
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
There are no FedRAMP-specific requirements if this control is used for a Low Impact system.
AC-6 (7)(a): There are no FedRAMP-specific requirements if this control is used for a Moderate Impact system.
AC-6 (7)(a): Reviews at a minimum, annually the privileges assigned to all users with privileges to validate the need for such privileges.
Supplemental Guidance:
The need for certain assigned user privileges may change over time reflecting changes in organizational missions/business function, environments of operation, technologies, or threat. Periodic review of assigned user privileges is necessary to determine if the rationale for assigning such privileges remains valid. If the need cannot be revalidated, organizations take appropriate corrective actions.
RELATED CONTROLS: AC-6 (7)
AC-6 (8) LEAST PRIVILEGE | PRIVILEGE LEVELS FOR CODE EXECUTION
-
FedRAMP Baseline Membership AC-6 (8):
- HIGH
The information system prevents [Assignment: organization-defined software] from executing at higher privilege levels than users executing the software.
Supplemental Guidance:
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
There are no FedRAMP-specific requirements if this control is used for a Low Impact system.
There are no FedRAMP-specific requirements if this control is used for a Moderate Impact system.
The information system prevents any software except software explicitly documented from executing at higher privilege levels than users executing the software.
In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher level than the privileges assigned to organizational users invoking such applications/programs, those users are indirectly provided with greater privileges than assigned by organizations.
AC-6 (9) LEAST PRIVILEGE | AUDITING USE OF PRIVILEGED FUNCTIONS
-
FedRAMP Baseline Membership AC-6 (9):
- MODERATE
- HIGH
The information system audits the execution of privileged functions.
Supplemental Guidance:
Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse, and in doing so, help mitigate the risk from insider threats and the advanced persistent threat (APT).
RELATED CONTROLS: AC-6 (9)
AC-6 (10) LEAST PRIVILEGE | PROHIBIT NON-PRIVILEGED USERS FROM EXECUTING PRIVILEGED FUNCTIONS
-
FedRAMP Baseline Membership AC-6 (10):
- MODERATE
- HIGH
The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Supplemental Guidance:
Privileged functions include, for example, establishing information system accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users.
REFERENCES:
- NO REFERENCES