Skip to main content
← All controls
IA-2 / IA-4 / AC-2 / A.9.2.1 / CIS-5.1 NIST SP 800-53 Rev 5

No shared admin credentials

Demonstrate that all administrative accounts are uniquely assigned to individual users and that no credentials providing elevated privileges are shared among multiple personnel or systems.

Description

What this control does

This control prohibits the use of shared administrative credentials across multiple users or systems. Each administrator must be assigned a unique, individually attributable account for privileged access. Shared credentials prevent accurate audit trails, enable lateral movement after single credential compromise, and obscure accountability for sensitive actions. Technical enforcement is achieved through identity and access management (IAM) policies, privileged access management (PAM) solutions, and directory service configurations that block credential reuse.

Control objective

What auditing this proves

Demonstrate that all administrative accounts are uniquely assigned to individual users and that no credentials providing elevated privileges are shared among multiple personnel or systems.

Associated risks

Risks this control addresses

  • Attacker uses a single compromised shared admin credential to gain persistent privileged access across multiple systems without detection
  • Inability to attribute malicious or erroneous administrative actions to a specific individual during forensic investigation
  • Delayed incident response when multiple users possess the same credential and cannot be isolated
  • Credential rotation failure when departing employees may retain knowledge of shared passwords still in use by others
  • Insider threat actors hide malicious activity behind shared accounts, preventing identification and prosecution
  • Compliance violations due to lack of individual accountability in audit logs for sensitive operations
  • Social engineering attacks scale horizontally as one shared credential provides access to numerous resources

Testing procedure

How an auditor verifies this control

  1. Obtain current exports of all administrative groups, roles, and privileged accounts from Active Directory, IAM platforms, cloud provider consoles, and PAM solutions.
  2. Cross-reference each administrative account username against the organization's human resources roster and identity lifecycle records to identify generic, service, or role-based account names.
  3. Select a sample of 15-20 administrative accounts across diverse systems (domain admins, database admins, cloud admins, network device admins) and request proof of individual assignment.
  4. Review password management policies and PAM system configurations to verify technical controls that prevent credential sharing or simultaneous login from multiple locations.
  5. Interview 5-7 administrators to confirm each possesses a unique credential and understands the prohibition on sharing passwords or using generic accounts.
  6. Examine authentication logs for the sampled accounts over the past 30 days, analyzing for simultaneous logins from different IP addresses or geographic locations that indicate credential sharing.
  7. Inspect privileged session recordings or audit logs to verify all administrative actions are traceable to named individuals, not generic accounts.
  8. Review access provisioning and deprovisioning workflows to confirm administrative credentials are created for named individuals and revoked upon role change or termination.
Evidence required Configuration exports from IAM platforms, Active Directory groups, PAM solutions, and cloud provider accounts showing administrative account names and assignments. Authentication logs demonstrating single-user login patterns for privileged accounts. Access control policy documentation prohibiting shared credentials. Privileged session audit logs with named user attribution. HR-correlated identity records linking each admin account to an individual employee.
Pass criteria All administrative accounts are uniquely assigned to individual users with no shared credentials in use, technical controls prevent credential reuse, and audit logs demonstrate individual accountability for all privileged actions.