About this program
A 6-question snapshot of privileged-account hygiene: shared admins, breakglass, vaulting, JIT, session recording.
Risks addressed
- Critical A compromised admin account allows full-environment takeover
- High Shared admin credentials prevent attribution
- High Standing privileged access expands the attack window
- Medium No audit trail of privileged actions
Controls (7)
-
Inventory of privileged accounts maintained
HighInventory of privileged accounts maintained
How to test + evidence
Testing procedure: Request the privileged account inventory; spot-check 5 accounts against directory roles.
Evidence to collect: Privileged account inventory (CSV).
-
No shared admin credentials
CriticalNo shared admin credentials
How to test + evidence
Testing procedure: Interview admins; review whether any role is shared. Check vault for shared secrets.
Evidence to collect: Vault audit log; admin role membership.
-
Break-glass accounts protected
HighBreak-glass accounts protected
How to test + evidence
Testing procedure: Verify break-glass accounts exist, credentials are sealed, alerts fire on use.
Evidence to collect: Sealed-envelope register + alert config screenshot.
-
Privileged access vaulted (PAM)
HighPrivileged access vaulted (PAM)
How to test + evidence
Testing procedure: Confirm admin passwords/keys are in a PAM solution; passwords rotated after checkout.
Evidence to collect: PAM tool config; rotation log.
-
Just-In-Time elevation in use
MediumJust-In-Time elevation in use
How to test + evidence
Testing procedure: Verify admins request elevation; standing access is the exception, not the default.
Evidence to collect: PIM/Approval workflow export.
-
Privileged session activity logged
HighPrivileged session activity logged
How to test + evidence
Testing procedure: Confirm privileged actions are logged centrally and reviewed monthly.
Evidence to collect: SIEM query + reviewer sign-off.
-
Quarterly access recertification of admins
MediumQuarterly access recertification of admins
How to test + evidence
Testing procedure: Pull the most recent privileged access recert; verify owners signed off within SLA.
Evidence to collect: Recert report with attestations.