AC-2: Account Management
From NIST's SP800-53:
a. Define and document the types of accounts allowed and specifically prohibited for use within the system; b. Assign account managers; c. Require [Assignment: organization-defined prerequisites and criteria] for group and role membership; d. Specify: 1. Authorized users of the system; 2. Group and role membership; and 3. Access authorizations (i.e., privileges) and [Assignment: organization-defined attributes (as required)] for each account; e. Require approvals by [Assignment: organization-defined personnel or roles] for requests to create accounts; f. Create, enable, modify, disable, and remove accounts in accordance with [Assignment: organization-defined policy, procedures, prerequisites, and criteria]; g. Monitor the use of accounts; h. Notify account managers and [Assignment: organization-defined personnel or roles] within: 1. [Assignment: organization-defined time period] when accounts are no longer required; 2. [Assignment: organization-defined time period] when users are terminated or transferred; and 3. [Assignment: organization-defined time period] when system usage or need-to-know changes for an individual; i. Authorize access to the system based on: 1. A valid access authorization; 2. Intended system usage; and 3. [Assignment: organization-defined attributes (as required)]; j. Review accounts for compliance with account management requirements [Assignment: organization-defined frequency]; k. Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group; and l. Align account management processes with personnel termination and transfer processes.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
Control ID | Description |
---|---|
PR.AC-1 | Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes |
PR.AC-4 | Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties |
DE.CM-1 | The network is monitored to detect potential cybersecurity events |
DE.CM-3 | Personnel activity is monitored to detect potential cybersecurity events |
PR.AC-6 | Identities are proofed and bound to credentials and asserted in interactions |
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1087.004 | Cloud Account | Discovery |
T1197 | BITS Jobs | Defense Evasion, Persistence |
T1538 | Cloud Service Dashboard | Discovery |
T1552.006 | Group Policy Preferences | Credential Access |
T1556 | Modify Authentication Process | Credential Access, Defense Evasion, Persistence |
T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | Exfiltration |
T1559.001 | Component Object Model | Execution |
T1569.002 | Service Execution | Execution |
T1213.003 | Code Repositories | Collection |
T1563 | Remote Service Session Hijacking | Lateral Movement |
T1562.006 | Indicator Blocking | Defense Evasion |
T1556.001 | Domain Controller Authentication | Credential Access, Defense Evasion, Persistence |
T1601.001 | Patch System Image | Defense Evasion |
T1606.001 | Web Cookies | Credential Access |
T1562.009 | Safe Mode Boot | Defense Evasion |
T1003.002 | Security Account Manager | Credential Access |
T1218 | System Binary Proxy Execution | Defense Evasion |
T1021.001 | Remote Desktop Protocol | Lateral Movement |
T1542 | Pre-OS Boot | Defense Evasion, Persistence |
T1601.002 | Downgrade System Image | Defense Evasion |
T1543.004 | Launch Daemon | Persistence, Privilege Escalation |
T1601 | Modify System Image | Defense Evasion |
T1003.006 | DCSync | Credential Access |
T1025 | Data from Removable Media | Collection |
T1021.002 | SMB/Windows Admin Shares | Lateral Movement |
T1003.003 | NTDS | Credential Access |
T1078.003 | Local Accounts | Defense Evasion, Initial Access, Persistence, Privilege Escalation |
T1599 | Network Boundary Bridging | Defense Evasion |
T1569 | System Services | Execution |
T1567 | Exfiltration Over Web Service | Exfiltration |
T1222 | File and Directory Permissions Modification | Defense Evasion |
T1021.003 | Distributed Component Object Model | Lateral Movement |
T1070.003 | Clear Command History | Defense Evasion |
T1098.003 | Additional Cloud Roles | Persistence, Privilege Escalation |
T1542.005 | TFTP Boot | Defense Evasion, Persistence |
T1005 | Data from Local System | Collection |
T1547.012 | Print Processors | Persistence, Privilege Escalation |
T1562.002 | Disable Windows Event Logging | Defense Evasion |
T1505.005 | Terminal Services DLL | Persistence |
T1606.002 | SAML Tokens | Credential Access |
T1556.006 | Multi-Factor Authentication | Credential Access, Defense Evasion, Persistence |
T1070.001 | Clear Windows Event Logs | Defense Evasion |
T1612 | Build Image on Host | Defense Evasion |
T1578 | Modify Cloud Compute Infrastructure | Defense Evasion |
T1134.002 | Create Process with Token | Defense Evasion, Privilege Escalation |
T1185 | Browser Session Hijacking | Collection |
T1552.001 | Credentials In Files | Credential Access |
T1048 | Exfiltration Over Alternative Protocol | Exfiltration |
T1552.002 | Credentials in Registry | Credential Access |
T1562.004 | Disable or Modify System Firewall | Defense Evasion |
T1059.008 | Network Device CLI | Execution |
T1047 | Windows Management Instrumentation | Execution |
T1053.006 | Systemd Timers | Execution, Persistence, Privilege Escalation |
T1055.008 | Ptrace System Calls | Defense Evasion, Privilege Escalation |
T1543 | Create or Modify System Process | Persistence, Privilege Escalation |
T1036 | Masquerading | Defense Evasion |
T1556.004 | Network Device Authentication | Credential Access, Defense Evasion, Persistence |
T1059 | Command and Scripting Interpreter | Execution |
T1059.002 | AppleScript | Execution |
T1003.005 | Cached Domain Credentials | Credential Access |
T1550 | Use Alternate Authentication Material | Defense Evasion, Lateral Movement |
T1547.004 | Winlogon Helper DLL | Persistence, Privilege Escalation |
T1574.008 | Path Interception by Search Order Hijacking | Defense Evasion, Persistence, Privilege Escalation |
T1562.007 | Disable or Modify Cloud Firewall | Defense Evasion |
T1098 | Account Manipulation | Persistence, Privilege Escalation |
T1134.001 | Token Impersonation/Theft | Defense Evasion, Privilege Escalation |
T1036.003 | Rename System Utilities | Defense Evasion |
T1003.004 | LSA Secrets | Credential Access |
T1021.006 | Windows Remote Management | Lateral Movement |
T1222.001 | Windows File and Directory Permissions Modification | Defense Evasion |
T1070.008 | Clear Mailbox Data | Defense Evasion |
T1562.008 | Disable or Modify Cloud Logs | Defense Evasion |
T1525 | Implant Internal Image | Persistence |
T1562 | Impair Defenses | Defense Evasion |
T1547.009 | Shortcut Modification | Persistence, Privilege Escalation |
T1052.001 | Exfiltration over USB | Exfiltration |
T1556.003 | Pluggable Authentication Modules | Credential Access, Defense Evasion, Persistence |
T1055 | Process Injection | Defense Evasion, Privilege Escalation |
T1606 | Forge Web Credentials | Credential Access |
T1053 | Scheduled Task/Job | Execution, Persistence, Privilege Escalation |
T1003 | OS Credential Dumping | Credential Access |
T1530 | Data from Cloud Storage | Collection |
T1098.005 | Device Registration | Persistence, Privilege Escalation |
T1585.003 | Cloud Accounts | Resource Development |
T1059.004 | Unix Shell | Execution |
T1495 | Firmware Corruption | Impact |
T1213.001 | Confluence | Collection |
T1036.005 | Match Legitimate Name or Location | Defense Evasion |
T1110.001 | Password Guessing | Credential Access |
T1212 | Exploitation for Credential Access | Credential Access |
T1078 | Valid Accounts | Defense Evasion, Initial Access, Persistence, Privilege Escalation |
T1559 | Inter-Process Communication | Execution |
T1041 | Exfiltration Over C2 Channel | Exfiltration |
T1070.009 | Clear Persistence | Defense Evasion |
T1537 | Transfer Data to Cloud Account | Exfiltration |
T1136.001 | Local Account | Persistence |
T1574.012 | COR_PROFILER | Defense Evasion, Persistence, Privilege Escalation |
T1484 | Domain Policy Modification | Defense Evasion, Privilege Escalation |
T1563.002 | RDP Hijacking | Lateral Movement |
T1586.003 | Cloud Accounts | Resource Development |
T1613 | Container and Resource Discovery | Discovery |
T1052 | Exfiltration Over Physical Medium | Exfiltration |
T1068 | Exploitation for Privilege Escalation | Privilege Escalation |
T1574.010 | Services File Permissions Weakness | Defense Evasion, Persistence, Privilege Escalation |
T1505.003 | Web Shell | Persistence |
T1003.001 | LSASS Memory | Credential Access |
T1574.007 | Path Interception by PATH Environment Variable | Defense Evasion, Persistence, Privilege Escalation |
T1558.003 | Kerberoasting | Credential Access |
T1078.001 | Default Accounts | Defense Evasion, Initial Access, Persistence, Privilege Escalation |
T1222.002 | Linux and Mac File and Directory Permissions Modification | Defense Evasion |
T1070.007 | Clear Network Connection History and Configurations | Defense Evasion |
T1078.004 | Cloud Accounts | Defense Evasion, Initial Access, Persistence, Privilege Escalation |
T1059.005 | Visual Basic | Execution |
T1003.008 | /etc/passwd and /etc/shadow | Credential Access |
T1021 | Remote Services | Lateral Movement |
T1558.001 | Golden Ticket | Credential Access |
T1578.003 | Delete Cloud Instance | Defense Evasion |
T1543.003 | Windows Service | Persistence, Privilege Escalation |
T1574 | Hijack Execution Flow | Defense Evasion, Persistence, Privilege Escalation |
T1210 | Exploitation of Remote Services | Lateral Movement |
T1609 | Container Administration Command | Execution |
T1053.003 | Cron | Execution, Persistence, Privilege Escalation |
T1134.003 | Make and Impersonate Token | Defense Evasion, Privilege Escalation |
T1528 | Steal Application Access Token | Credential Access |
T1580 | Cloud Infrastructure Discovery | Discovery |
T1218.007 | Msiexec | Defense Evasion |
T1556.007 | Hybrid Identity | Credential Access, Defense Evasion, Persistence |
T1078.002 | Domain Accounts | Defense Evasion, Initial Access, Persistence, Privilege Escalation |
T1136.002 | Domain Account | Persistence |
T1546.003 | Windows Management Instrumentation Event Subscription | Persistence, Privilege Escalation |
T1543.002 | Systemd Service | Persistence, Privilege Escalation |
T1070 | Indicator Removal | Defense Evasion |
T1547.013 | XDG Autostart Entries | Persistence, Privilege Escalation |
T1569.001 | Launchctl | Execution |
T1110.002 | Password Cracking | Credential Access |
T1547.006 | Kernel Modules and Extensions | Persistence, Privilege Escalation |
T1053.005 | Scheduled Task | Execution, Persistence, Privilege Escalation |
T1578.002 | Create Cloud Instance | Defense Evasion |
T1543.001 | Launch Agent | Persistence, Privilege Escalation |
T1574.004 | Dylib Hijacking | Defense Evasion, Persistence, Privilege Escalation |
T1542.003 | Bootkit | Defense Evasion, Persistence |
T1550.003 | Pass the Ticket | Defense Evasion, Lateral Movement |
T1552.004 | Private Keys | Credential Access |
T1136 | Create Account | Persistence |
T1574.005 | Executable Installer File Permissions Weakness | Defense Evasion, Persistence, Privilege Escalation |
T1059.001 | PowerShell | Execution |
T1648 | Serverless Execution | Execution |
T1558.004 | AS-REP Roasting | Credential Access |
T1550.002 | Pass the Hash | Defense Evasion, Lateral Movement |
T1048.003 | Exfiltration Over Unencrypted Non-C2 Protocol | Exfiltration |
T1053.002 | At | Execution, Persistence, Privilege Escalation |
T1610 | Deploy Container | Defense Evasion, Execution |
T1110.003 | Password Spraying | Credential Access |
T1110.004 | Credential Stuffing | Credential Access |
T1098.002 | Additional Email Delegate Permissions | Persistence, Privilege Escalation |
T1621 | Multi-Factor Authentication Request Generation | Credential Access |
T1562.001 | Disable or Modify Tools | Defense Evasion |
T1548 | Abuse Elevation Control Mechanism | Defense Evasion, Privilege Escalation |
T1072 | Software Deployment Tools | Execution, Lateral Movement |
T1059.007 | JavaScript | Execution |
T1136.003 | Cloud Account | Persistence |
T1558 | Steal or Forge Kerberos Tickets | Credential Access |
T1489 | Service Stop | Impact |
T1213.002 | Sharepoint | Collection |
T1505.002 | Transport Agent | Persistence |
T1053.007 | Container Orchestration Job | Execution, Persistence, Privilege Escalation |
T1059.003 | Windows Command Shell | Execution |
T1574.009 | Path Interception by Unquoted Path | Defense Evasion, Persistence, Privilege Escalation |
T1578.001 | Create Snapshot | Defense Evasion |
T1619 | Cloud Storage Object Discovery | Discovery |
T1110 | Brute Force | Credential Access |
T1003.007 | Proc Filesystem | Credential Access |
T1552 | Unsecured Credentials | Credential Access |
T1548.002 | Bypass User Account Control | Defense Evasion, Privilege Escalation |
T1056.003 | Web Portal Capture | Collection, Credential Access |
T1059.006 | Python | Execution |
T1599.001 | Network Address Translation Traversal | Defense Evasion |
T1190 | Exploit Public-Facing Application | Initial Access |
T1556.005 | Reversible Encryption | Credential Access, Defense Evasion, Persistence |
T1542.001 | System Firmware | Defense Evasion, Persistence |
T1070.002 | Clear Linux or Mac System Logs | Defense Evasion |
T1558.002 | Silver Ticket | Credential Access |
T1213 | Data from Information Repositories | Collection |
T1021.005 | VNC | Lateral Movement |
T1611 | Escape to Host | Privilege Escalation |
T1505 | Server Software Component | Persistence |
T1098.001 | Additional Cloud Credentials | Persistence, Privilege Escalation |
T1552.007 | Container API | Credential Access |
T1548.003 | Sudo and Sudo Caching | Defense Evasion, Privilege Escalation |
T1134 | Access Token Manipulation | Defense Evasion, Privilege Escalation |
T1021.004 | SSH | Lateral Movement |
T1563.001 | SSH Hijacking | Lateral Movement |