STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

AC-2

Access ControlRev 5organization

Account Management

Baselines:LowModerateHigh

Control Statement

a. Define and document the types of accounts allowed and specifically prohibited for use within the system; b. Assign account managers; c. Require [Assignment: prerequisites and criteria] for group and role membership; d. Specify: 1. Authorized users of the system; 2. Group and role membership; and 3. Access authorizations (i.e., privileges) and [Assignment: attributes (as required)] for each account; e. Require approvals by [Assignment: personnel or roles] for requests to create accounts; f. Create, enable, modify, disable, and remove accounts in accordance with [Assignment: policy, procedures, prerequisites, and criteria]; g. Monitor the use of accounts; h. Notify account managers and [Assignment: personnel or roles] within: 1. [Assignment: time period] when accounts are no longer required; 2. [Assignment: time period] when users are terminated or transferred; and 3. [Assignment: time period] when system usage or need-to-know changes for an individual; i. Authorize access to the system based on: 1. A valid access authorization; 2. Intended system usage; and 3. [Assignment: attributes (as required)]; j. Review accounts for compliance with account management requirements [Assignment: frequency]; k. Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group; and l. Align account management processes with personnel termination and transfer processes.

Supplemental Guidance

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specification of access privileges reflect the requirements in other controls in the security plan. Users requiring administrative privileges on system accounts receive additional scrutiny by organizational personnel responsible for approving such accounts and privileged access, including system owner, mission or business owner, senior agency information security officer, or senior agency official for privacy. Types of accounts that organizations may wish to prohibit due to increased risk include shared, group, emergency, anonymous, temporary, and guest accounts. Where access involves personally identifiable information, security programs collaborate with the senior agency official for privacy to establish the specific conditions for group and role membership; specify authorized users, group and role membership, and access authorizations for each account; and create, adjust, or remove system accounts in accordance with organizational policies. Policies can include such information as account expiration dates or other factors that trigger the disabling of accounts. Organizations may choose to define access privileges or other attributes by account, type of account, or a combination of the two. Examples of other attributes required for authorizing access include restrictions on time of day, day of week, and point of origin. In defining other system account attributes, organizations consider system-related requirements and mission/business requirements. Failure to consider these factors could affect system availability. Temporary and emergency accounts are intended for short-term use. Organizations establish temporary accounts as part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts, including local logon accounts used for special tasks or when network resources are unavailable (may also be known as accounts of last resort). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include when shared/group, emergency, or temporary accounts are no longer required and when individuals are transferred or terminated. Changing shared/group authenticators when members leave the group is intended to ensure that former group members do not retain access to the shared or group account. Some types of system accounts may require specialized training.

Related Controls (28)

AC-3AC-5AC-6AC-17AC-18AC-20AC-24AU-2AU-12CM-5IA-2IA-4IA-5IA-8MA-3MA-5PE-2PL-4PS-2PS-4PS-5

CCI Identifiers (47)

CCI-000013The organization manages information system accounts by notifying account managers when temporary accounts are no longer required and when information system users are terminated, transferred, or information system usage or need-to-know/need-to-share changes.CCI-000007The organization manages information system accounts by identifying account types (i.e., individual, group, system, application, guest/anonymous, and temporary).CCI-000009The organization manages information system accounts by identifying authorized users of the information system and specifying access privileges.CCI-000010Require approvals by organization-defined personnel or roles for requests to create accounts.CCI-000011Create, enable, modify, disable, and remove system accounts in accordance with organization-defined procedures.CCI-000012Review accounts for compliance with account management requirements per organization-defined frequency.CCI-000014The organization manages information system accounts by granting access to the system based on a valid access authorization; intended system usage; and other attributes as required by the organization or associated missions/business functions.

Linked STIG Checks (67)

Across 60 STIGs. Click to expand.

PS-7
PT-2
PT-3
SC-7
SC-12
SC-13
SC-37
CCI-003613
Require organization-defined prerequisites and criteria for group membership.
CCI-003615Defines the prerequisites and criteria for group and role membership.
CCI-003616Defines the attributes (as required) for each account.
CCI-003617Create, enable, modify, disable, and remove system accounts in accordance with organization-defined policy.
CCI-002110The organization defines the information system account types that support the organizational missions/business functions.
CCI-002111The organization identifies and selects the organization-defined information system account types of information system accounts which support organizational missions/business functions.
CCI-002112Assign account managers.
CCI-002113The organization establishes conditions for role membership.
CCI-002114The organization specifies authorized users of the information system for each account.deprecated
CCI-002115Specify authorized users of the system.
CCI-002116Specify authorized users of the group.
CCI-002117Specify authorized users of the role membership.
CCI-002118Specify authorized access authorizations (i.e., privileges) for each account.
CCI-002119Specify organization-attributes (as required) for each account on the system.
CCI-002120Defines the personnel or roles authorized to approve the creation of accounts.
CCI-002121Defines the procedures to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
CCI-002123Notify account managers and organization-defined personnel or roles within an organization-defined time-period when accounts are no longer required.
CCI-002126Authorize access to the system based on a valid access authorization.
CCI-003614Require organization-defined prerequisites and criteria for role membership.
CCI-000237The organization manages information system accounts by specifically authorizing and monitoring the use of guest/anonymous accounts and temporary accounts.
CCI-003618Create, enable, modify, disable, and remove system accounts in accordance with organization-defined criteria.
CCI-003619Create, enable, modify, disable, and remove system accounts in accordance with organization-defined prerequisites.
CCI-003620Defines the policy to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
CCI-003621Defines the prerequisites to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
CCI-003622Defines the criteria to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
CCI-001354The organization manages information system accounts by deactivating temporary accounts that are no longer required.
CCI-001355The organization manages information system accounts by deactivating accounts of terminated or transferred users.
CCI-003612Define and document the types of accounts allowed and specifically prohibited for use within the system.
CCI-002124Notify account managers and organization-defined personnel or roles within an organization-defined time-period when users are terminated or transferred.
CCI-002125Notify account managers and organization-defined personnel or roles within an organization-defined time-period when system usage or need-to-know changes for an individual.
CCI-002127Authorize access to the system based on intended system usage.
CCI-002128Authorize access to the system based on organization-defined attributes (as required).
CCI-002129Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group.
CCI-001547Defines the frequency on which it will review information system accounts for compliance with account management requirements.
CCI-000008The organization establishes conditions for group membership.
CCI-002122Monitor the use of accounts.
CCI-003623Defines the personnel or roles of whom to notify when accounts are no longer required; when users are terminated or transferred; and when system usage or need-to-know changes for an individual.
CCI-003624Defines the time period of when to notify account managers for each situation.
CCI-003625Defines the attributes (as required) for authorizing access to the system.
CCI-003626Align account management processes with personnel termination and transfer processes.