AC-2: Account Management

Control Family:

Access Control

CSF v1.1 References:

Baselines:

Previous Version:

Info icon.

Incorporates the following control from the previous version: AC-2(10): Shared / Group Account Credential Termination.

Control Statement

  1. Define and document the types of accounts allowed and specifically prohibited for use within the system;
  2. Assign account managers;
  3. Require [Assignment: organization-defined prerequisites and criteria] for group and role membership;
  4. Specify:
    1. Authorized users of the system;
    2. Group and role membership; and
    3. Access authorizations (i.e., privileges) and [Assignment: organization-defined attributes (as required)] for each account;
  5. Require approvals by [Assignment: organization-defined personnel or roles] for requests to create accounts;
  6. Create, enable, modify, disable, and remove accounts in accordance with [Assignment: organization-defined policy, procedures, prerequisites, and criteria];
  7. Monitor the use of accounts;
  8. Notify account managers and [Assignment: organization-defined personnel or roles] within:
    1. [Assignment: organization-defined time period] when accounts are no longer required;
    2. [Assignment: organization-defined time period] when users are terminated or transferred; and
    3. [Assignment: organization-defined time period] when system usage or need-to-know changes for an individual;
  9. Authorize access to the system based on:
    1. A valid access authorization;
    2. Intended system usage; and
    3. [Assignment: organization-defined attributes (as required)];
  10. Review accounts for compliance with account management requirements [Assignment: organization-defined frequency];
  11. Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group; and
  12. Align account management processes with personnel termination and transfer processes.

Supplemental Guidance

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specification of access privileges reflect the requirements in other controls in the security plan. Users requiring administrative privileges on system accounts receive additional scrutiny by organizational personnel responsible for approving such accounts and privileged access, including system owner, mission or business owner, senior agency information security officer, or senior agency official for privacy. Types of accounts that organizations may wish to prohibit due to increased risk include shared, group, emergency, anonymous, temporary, and guest accounts.

Where access involves personally identifiable information, security programs collaborate with the senior agency official for privacy to establish the specific conditions for group and role membership; specify authorized users, group and role membership, and access authorizations for each account; and create, adjust, or remove system accounts in accordance with organizational policies. Policies can include such information as account expiration dates or other factors that trigger the disabling of accounts. Organizations may choose to define access privileges or other attributes by account, type of account, or a combination of the two. Examples of other attributes required for authorizing access include restrictions on time of day, day of week, and point of origin. In defining other system account attributes, organizations consider system-related requirements and mission/business requirements. Failure to consider these factors could affect system availability.

Temporary and emergency accounts are intended for short-term use. Organizations establish temporary accounts as part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts, including local logon accounts used for special tasks or when network resources are unavailable (may also be known as accounts of last resort). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include when shared/group, emergency, or temporary accounts are no longer required and when individuals are transferred or terminated. Changing shared/group authenticators when members leave the group is intended to ensure that former group members do not retain access to the shared or group account. Some types of system accounts may require specialized training.

Control Enhancements

AC-2(3): Disable Accounts

Baseline(s):

  • Moderate
  • High

Disable accounts within [Assignment: organization-defined time period] when the accounts: Have expired; Are no longer associated with a user or individual; Are in violation of organizational policy; or Have been inactive for [Assignment: organization-defined time period].

AC-2(5): Inactivity Logout

Baseline(s):

  • Moderate
  • High

Require that users log out when [Assignment: organization-defined time period of expected inactivity or description of when to log out].

AC-2(7): Privileged User Accounts

Baseline(s):

(Not part of any baseline)

Establish and administer privileged user accounts in accordance with [Assignment: a role-based access scheme, an attribute-based access scheme]; Monitor privileged role or attribute assignments; Monitor changes to roles or attributes; and Revoke access when privileged role or attribute assignments are no longer appropriate.

AC-2(8): Dynamic Account Management

Baseline(s):

(Not part of any baseline)

Create, activate, manage, and deactivate [Assignment: organization-defined system accounts] dynamically.

AC-2(11): Usage Conditions

Baseline(s):

  • High

Enforce [Assignment: organization-defined circumstances and/or usage conditions] for [Assignment: organization-defined system accounts].

AC-2(12): Account Monitoring for Atypical Usage

Baseline(s):

  • High

Monitor system accounts for [Assignment: organization-defined atypical usage]; and Report atypical usage of system accounts to [Assignment: organization-defined personnel or roles].