Skip to main content
← All controls
AC-2(2) / AC-6(2) / IA-11 / A.9.2.3 / CIS-5.4 NIST SP 800-53 Rev 5

Privileged Identity Management for admin roles

Demonstrate that administrative access is granted through temporary, just-in-time elevation mechanisms with documented approval, time constraints, and comprehensive audit trails rather than permanent privilege assignments.

Description

What this control does

Privileged Identity Management (PIM) for administrative roles enforces just-in-time access elevation, time-bound assignments, approval workflows, and comprehensive audit logging for users performing privileged operations. Instead of granting permanent administrative rights, PIM requires users to activate eligible roles through documented justification, triggering notifications and time-limited sessions. This control reduces the attack surface by minimizing standing privileges and enforcing accountability through mandatory activation records and periodic access reviews.

Control objective

What auditing this proves

Demonstrate that administrative access is granted through temporary, just-in-time elevation mechanisms with documented approval, time constraints, and comprehensive audit trails rather than permanent privilege assignments.

Associated risks

Risks this control addresses

  • Adversaries exploiting compromised user accounts with permanent administrative privileges to maintain persistent access and evade detection
  • Insider threats abusing standing administrative rights to exfiltrate data, modify configurations, or destroy evidence without triggering activation alerts
  • Lateral movement attacks escalating privileges through accounts with unused but active administrative permissions
  • Compliance violations due to inability to demonstrate when, why, and by whom privileged actions were performed
  • Privilege creep accumulating over time as role assignments are granted but never expire or require revalidation
  • Unauthorized administrative actions performed during off-hours or outside approved change windows without approval workflows
  • Failure to detect compromised privileged accounts due to lack of activation baselines and anomaly detection on elevation events

Testing procedure

How an auditor verifies this control

  1. Inventory all administrative and privileged roles across identity platforms (Azure AD, Active Directory, AWS IAM, GCP IAM, privileged access management solutions) and identify which are governed by PIM or equivalent just-in-time mechanisms.
  2. Review PIM configuration settings to verify maximum activation duration limits, approval requirements, notification recipients, and multi-factor authentication enforcement for role elevation.
  3. Select a representative sample of 15-25 users with eligible privileged roles and validate that no permanent active assignments exist outside documented exception processes.
  4. Examine PIM activation logs for the past 90 days to confirm users are activating roles rather than holding standing privileges, extracting activation timestamps, justification text, approver records, and session durations.
  5. Test the activation workflow by requesting elevation for a sample privileged role, documenting approval chain, MFA challenge, time-to-grant, and automatic expiration behavior.
  6. Review access review records to verify periodic recertification of eligible role assignments occurs at least quarterly, with documentation of approvers and removal of inappropriate assignments.
  7. Analyze SIEM or log aggregation platform for correlation of PIM activation events with privileged actions (e.g., configuration changes, data access, user modifications) to validate audit trail completeness.
  8. Interview 3-5 administrators to confirm operational awareness of activation procedures, business justification requirements, and emergency access protocols for PIM-governed roles.
Evidence required Collect PIM configuration exports showing role settings, activation duration maximums, approval workflows, and MFA requirements; activation audit logs spanning 90 days with timestamps, justifications, and approver identities; access review reports demonstrating quarterly recertification with approval signatures; screenshots of eligible versus active role assignments for sampled users; SIEM query results correlating activation events with privileged operations; and documentation of emergency access procedures and exception handling processes.
Pass criteria All administrative roles are governed by just-in-time activation with maximum session durations not exceeding 8 hours, mandatory approval and MFA for activation, zero permanent active assignments outside documented exceptions, quarterly access reviews completed with evidence of assignment removals, and complete audit logs correlating all privileged actions to time-bound activation events.

Where this control is tested

Audit programs including this control