FedRAMP Role-based Schemes AC-2 (7)


Overview:
The organization:
(a) Establishes and administers privileged user accounts in accordance with a role-based access scheme that organizes allowed information system access and privileges into roles;
(b) Monitors privileged role assignments; and
(c) Takes [Assignment: organization-defined actions] when privileged role assignments are no longer appropriate.


Supplemental Guidance:
Privileged roles are organization-defined roles assigned to individuals that allow those individuals to perform certain security-relevant functions that ordinary users are not authorized to perform. These privileged roles include, for example, key management, account management, network and system administration, database administration, and web administration.


Action Items:
1) Define privileged roles and monitor their assignment


Related Documents:
1) Access Control Policy

2) Identity and Access Management Policy


Additional Guidance:
Moderate FedRAMP-Defined Assignment / Selection Parameters
none


Moderate Additional FedRAMP Requirements and Guidance
none



Article ID: 16
Created: September 25, 2022
Last Updated: September 26, 2022
Author: Matthew Burdick

Online URL: http://www.compliancewiki.org/article/fedramp-role-based-schemes-ac-2-7-16.html