IAM-11: Are processes and procedures for customers to participate, where applicable,
in granting access for agreed, high risk as (defined by the organizational risk
assessment) privileged access roles defined, implemented and evaluated?
Processes and procedures should include the following: • Access to privileged user IDs should be restricted to least privilege and business need to know. • Require documented approval by authorized parties specifying required privileges. • All actions taken by any individual with root or administrative privileges should be logged. • Use of and changes to privileged accounts, including elevation of privileges should be monitored for suspicious activity such as logon failures or attempts to escalate permissions using a SIEM solution.
Control implemented
Control ownership
Description
Define, implement and evaluate processes and procedures for customers
to participate, where applicable, in the granting of access for agreed, high
risk (as defined by the organizational risk assessment) privileged access roles.