Skip to main content
โ† All controls
AC-2(7) / A.9.2.1 / CIS-5.4 NIST SP 800-53 Rev 5

Permissions inherited from groups, not users

Demonstrate that access permissions throughout the environment are granted through group membership and that direct user-level permission assignments are either prohibited or documented as exceptions with appropriate justification.

Description

What this control does

This control requires that access permissions to systems, applications, and data resources be assigned through group membership rather than directly to individual user accounts. When a user requires access, they are added to a group with the appropriate permissions rather than granting permissions to the user object itself. This approach centralizes permission management, reduces administrative overhead, and ensures consistent application of access policies. Group-based inheritance also facilitates auditing by creating clear permission structures that can be reviewed programmatically and reduces the risk of orphaned permissions persisting after role changes.

Control objective

What auditing this proves

Demonstrate that access permissions throughout the environment are granted through group membership and that direct user-level permission assignments are either prohibited or documented as exceptions with appropriate justification.

Associated risks

Risks this control addresses

  • Permissions granted directly to users remain undetected when performing group-based access reviews, allowing unauthorized access to persist
  • Direct user permissions bypass centralized approval workflows and change management processes, enabling privilege escalation outside formal controls
  • Administrators struggle to identify all permissions held by a user during offboarding or role changes, leading to incomplete access revocation
  • Inconsistent permission assignments create configuration drift where users with identical roles have different access levels, violating least privilege principles
  • Orphaned direct permissions accumulate over time as users change roles, creating undocumented access pathways exploitable by insiders or compromised accounts
  • Audit trails become fragmented when permissions exist at multiple levels, obscuring who authorized specific access grants and when
  • Automated provisioning and deprovisioning systems fail to detect or manage direct user permissions, leaving gaps in identity lifecycle management

Testing procedure

How an auditor verifies this control

  1. Obtain an inventory of all systems, applications, and data repositories within scope that support role-based or group-based access control mechanisms.
  2. Export access control lists, permission assignments, and group membership data from representative systems including Active Directory, cloud IAM platforms, databases, and enterprise applications.
  3. Execute queries or scripts to identify all permissions assigned directly to user objects rather than through group membership across sampled systems.
  4. Select a representative sample of 20-30 user accounts spanning different roles, departments, and privilege levels for detailed permission analysis.
  5. Review each sampled user account to enumerate all direct permission assignments and verify whether documented exception processes exist for each instance.
  6. Interview system administrators and identity management personnel to confirm the existence and enforcement of policies prohibiting direct user permission grants.
  7. Examine change management records and ticketing systems to verify that any identified direct permissions were authorized through formal exception approval processes.
  8. Test group membership changes by selecting a recent role change or offboarding event and verify that permission removal occurred solely through group membership revocation without residual direct grants.
Evidence required Access control configuration exports showing user accounts, group memberships, and permission assignments from Active Directory, Azure AD, AWS IAM, or equivalent systems. Query results or scripts demonstrating programmatic detection of direct user permissions versus group-inherited permissions. Exception documentation including approval records, business justifications, and review dates for any instances of direct user permission grants. Interview notes from identity and access management staff confirming policy enforcement and automated controls preventing direct assignments.
Pass criteria At least 95% of all access permissions are assigned through group membership with any direct user permission assignments documented as approved exceptions with valid business justifications and regular review cycles.

Where this control is tested

Audit programs including this control