Privileged accounts are separated and access is minimized
Administrator and privileged accounts are the highest-value targets for attackers. An attacker who compromises a privileged account can move laterally, exfiltrate data, and persist undetected far more easily than with a standard user account. Separating privileged accounts from daily-use accounts, minimizing who holds them, and reviewing them regularly significantly reduces the blast radius of a compromise.
Implementation steps
- 1
Create separate privileged accounts for administrative tasks
Administrators should have two accounts: a standard account for daily work (email, browsing, documents) and a separate privileged account used only for administrative tasks. The privileged account should not be used for routine work and should not have email or browser access. This prevents phishing and malware from the standard account from directly compromising admin credentials.
okta azure-ad aws-iam - 2
Apply just-in-time access for privileged operations
Where possible, use time-limited privilege elevation rather than standing privileged access. Request elevated access for a specific task, perform the task, and let the elevation expire. This means that even a compromised admin account has no standing privileged access to abuse.
cyberark okta-pam aws-iam hashicorp-vault - 3
Minimize and document who holds privileged access
Maintain a list of all privileged accounts and their owners. Reduce the number of accounts with admin access to the minimum necessary. Review the list quarterly and remove access that is no longer required. Alert on new privileged account creation.
okta aws-iam drata vanta
Evidence required
Privileged account inventory
Documentation of all privileged accounts and their justification.
- - List of admin accounts with owners and business justification
- - IAM policy showing separation of privileged and standard roles
- - Quarterly privileged access review records
Related controls
Multi-factor authentication is required for all user accounts
Account Security
Unique credentials are used and shared accounts are eliminated
Account Security
Credentials are revoked immediately on known or suspected compromise
Account Security
Phishing-resistant MFA is enforced for privileged and high-value accounts
Account Security