STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

AC-3 (7)

Access ControlRev 5organization

Access Enforcement

Control Statement

Enforce a role-based access control policy over defined subjects and objects and control access based upon [Assignment: organization-defined roles and users authorized to assume such roles].

Supplemental Guidance

Role-based access control (RBAC) is an access control policy that enforces access to objects and system functions based on the defined role (i.e., job function) of the subject. Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed operations on the systems associated with the organization-defined roles. When users are assigned to specific roles, they inherit the authorizations or privileges defined for those roles. RBAC simplifies privilege administration for organizations because privileges are not assigned directly to every user (which can be a large number of individuals) but are instead acquired through role assignments. RBAC can also increase privacy and security risk if individuals assigned to a role are given access to information beyond what they need to support organizational missions or business functions. RBAC can be implemented as a mandatory or discretionary form of access control. For organizations implementing RBAC with mandatory access controls, the requirements in [AC-3(3)](#ac-3.3) define the scope of the subjects and objects covered by the policy.

CCI Identifiers (11)

CCI-002169Enforce a role-based access control policy over defined subjects and objects based upon organization-defined roles and users authorized to assume such roles.CCI-002170Control access based upon organization-defined roles and users authorized to assume such roles.CCI-002171The information system enforces a role-based access control policy over organization-defined subjects.deprecatedCCI-002166Defines the role-based access control policies to enforce over all subjects and objects.CCI-002167The organization defines the subjects over which the information system will enforce a role-based access control policy.CCI-002168The organization defines the objects over which the information system will enforce a role-based access control policy.CCI-002172The information system enforces a role-based access control policy over organization-defined objects.deprecatedCCI-002173Defines the roles authorized to control access based upon the role-based access control policy.CCI-002174Defines the users authorized to control access based upon the role-based access control policy.CCI-002175The information system controls access based upon organization-defined roles authorized to assume such roles, employing the organization-defined role-based access control policy.deprecatedCCI-002176The information system controls access based upon organization-defined users authorized to assume such roles, employing the organization-defined role-based access control policy.deprecated

Linked STIG Checks (24)

Across 24 STIGs. Click to expand.