PR.AA-05.209
Has your organization implemented a least privilege access model that restricts user access and privileges to only what is necessary for their job functions?
Explanation
Least privilege access control ensures users have only the minimum permissions needed to perform their job functions, reducing the potential attack surface and limiting the impact of compromised accounts. This approach is a core principle of zero trust architecture, where no user or system is inherently trusted, and verification is required for all access requests regardless of location or network. Evidence of implementation could include access control policies, role definitions with associated permission sets, documentation of periodic access reviews, and logs showing privilege elevation processes. A comprehensive privilege management matrix mapping job roles to specific system access levels would be particularly valuable evidence.
Implementation Example
Restrict access and privileges to the minimum necessary (e.g., zero trust architecture)
ID: PR.AA-05.209
Context
- Function
- PR: PROTECT
- Category
- PR.AA: Identity Management, Authentication, and Access Control
- Sub-Category
- Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties

