IAM-05: Is the least privilege principle employed when implementing information system
access?
User and service account access should leverage access control methods, such as role-based access control (RBAC) and attribute-based access control (ABAC). In addition, conduct regular reviews of access processes (including auditing, when appropriate) to identify non-adherence to the principle of least privilege.
Restrict privileged access and access to administrative accounts should be via the principle of least privilege and a need-to-know basis. Furthermore, access should be set to “deny all“ unless specifically allowed.
Control implemented
Control ownership
Description
Employ the least privilege principle when implementing information
system access.