graphgrc

ACC-04: Privileged Access Management

Objective

Protect critical systems through enhanced controls on privileged accounts.

Description

Administrative and privileged access is tightly controlled, monitored, and audited. Break-glass procedures exist for emergency access.

Implementation Details

Admin Accounts: Separate admin accounts (admin@) from regular user accounts. MFA required for all admin access.

AWS Root Account: Root account MFA enabled with hardware token. Root credentials stored in physical safe. Access requires two executives.

Session Recording: All privileged sessions recorded using AWS CloudTrail and CloudWatch Logs.

Break Glass: Emergency access procedures documented. Break-glass account usage triggers alert to security team and CEO.

Examples

Audit Evidence


Framework Mapping

SOC 2

GDPR


Referenced By

This section is automatically generated by make generate-backlinks. Do not edit manually.

Standards:

Processes: