Skip to main content
← All controls
AC-2 / AC-6 / AU-6 / IA-2 / A.9.2.3 / A.9.4.1 / CIS-5.4 / CIS-6.8 NIST SP 800-53 Rev 5 SOC 2

Are privileged accounts limited, monitored, with separate IDs and reviewed monthly?

Demonstrate that privileged accounts are restricted to necessary personnel only, assigned unique identifiers without sharing, subject to continuous monitoring with logging enabled, and reviewed through documented monthly access recertification processes.

Description

What this control does

This control requires organizations to limit the number of privileged accounts, assign unique individual identifiers to each privileged user (no shared credentials), continuously monitor privileged account activity through logging and alerting mechanisms, and conduct formal access reviews at least monthly to validate necessity and appropriateness. Privileged accounts include domain administrators, database administrators, security administrators, and any accounts with elevated system, application, or data access rights. This practice reduces attack surface, enables accountability, and ensures timely detection of unauthorized or anomalous privileged activity.

Control objective

What auditing this proves

Demonstrate that privileged accounts are restricted to necessary personnel only, assigned unique identifiers without sharing, subject to continuous monitoring with logging enabled, and reviewed through documented monthly access recertification processes.

Associated risks

Risks this control addresses

  • Unauthorized privilege escalation by attackers exploiting excessive administrative account provisioning
  • Insider threats leveraging shared privileged credentials to perform malicious actions with plausible deniability
  • Delayed detection of compromised privileged accounts due to inadequate monitoring or alerting
  • Privilege creep where users accumulate unnecessary administrative rights that persist beyond business need
  • Lateral movement and persistent access by threat actors using dormant or orphaned privileged accounts
  • Audit trail gaps caused by shared accounts preventing attribution of privileged actions to specific individuals
  • Regulatory non-compliance and failed audits due to inability to demonstrate least privilege and periodic reviews

Testing procedure

How an auditor verifies this control

  1. Obtain a complete inventory of all privileged accounts from identity management systems, directory services (Active Directory, LDAP), database management systems, cloud IAM platforms, and application administration interfaces.
  2. Review the organization's privileged access policy and procedures to confirm documented requirements for account limitation, unique IDs, monitoring, and monthly reviews.
  3. Select a sample of 15-25 privileged accounts across different systems and verify each has a unique user identifier mapped to a single named individual with no evidence of credential sharing.
  4. Examine access control configurations and role assignments to assess whether privileged accounts follow least privilege principles and are limited to personnel with documented business justification.
  5. Review privileged account monitoring configurations including SIEM rules, privileged access management (PAM) system logs, audit logging settings, and alerting thresholds to confirm continuous monitoring is active.
  6. Obtain and inspect monthly access review documentation for the past three months, verifying reviews include privileged account rosters, approver sign-offs, dates performed, and documented remediation of identified issues.
  7. Test a sample of 5-10 logged privileged activities to confirm events are captured with sufficient detail (user ID, timestamp, action performed, system affected) and correlate to monitoring dashboards or reports.
  8. Interview privileged account owners and IT security personnel to validate understanding of review processes, monitoring alert response procedures, and accountability for the monthly recertification cycle.
Evidence required Collect privileged account inventory exports from identity management systems and directory services with role assignments and last access dates. Obtain screenshots or configuration exports from SIEM, PAM systems, or audit logging platforms demonstrating active monitoring rules and alert configurations. Gather signed monthly access review reports for the most recent three months showing reviewer names, review dates, account lists examined, and remediation actions taken for any discrepancies.
Pass criteria The control passes if all privileged accounts have unique individual identifiers, the total number of privileged accounts is justified and documented with business need, continuous monitoring with logging and alerting is configured and operational, and formal access reviews have been completed and documented monthly for the audit period with evidence of remediation for identified issues.