800-53|AC-6

Title

LEAST PRIVILEGE

Description

The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.

Supplemental

Organizations employ least privilege for specific duties and information systems. The principle of least privilege is also applied to information system processes, ensuring that the processes operate at privilege levels no higher than necessary to accomplish required organizational missions/business functions. Organizations consider the creation of additional processes, roles, and information system accounts as necessary, to achieve least privilege. Organizations also apply least privilege to the development, implementation, and operation of organizational information systems.

Reference Item Details

Related: AC-2,AC-3,AC-5,CM-6,CM-7,PL-2

Category: ACCESS CONTROL

Family: ACCESS CONTROL

Priority: P1

Baseline Impact: MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.1 - SerializedSystemIni.dat Password File is not ProtectedWindowsTNS Oracle WebLogic Server 11 Windows Best Practices
1.1 Create local-settings.js file - general.config.filenameUnixCIS Mozilla Firefox 38 ESR Linux L1 v1.0.0
1.1 Create local-settings.js file - general.config.filenameUnixCIS Mozilla Firefox 102 ESR Linux L1 v1.0.0
1.1 Default Install Files - 'iisadmpwd' Check if existWindowsCIS IIS 6.0 v1.0.0
1.1 Default Install Files - 'iisadmpwd' Check if using Integrated Windows AuthenticationWindowsCIS IIS 6.0 v1.0.0
1.1 Ensure 'Web content' is on non-system partitionWindowsCIS IIS 10 v1.2.1 Level 1
1.1.1 Ensure Administrative accounts are separate and cloud-onlymicrosoft_azureCIS Microsoft 365 Foundations E3 L1 v3.1.0
1.1.1 Ensure that the --allow-privileged argument is set to falseUnixCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1
1.1.1 Ensure that the API server pod specification file permissions are set to 600 or more restrictiveUnixCIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master
1.1.1 Ensure that the API server pod specification file permissions are set to 600 or more restrictiveUnixCIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master
1.1.1 Ensure that the API server pod specification file permissions are set to 600 or more restrictiveUnixCIS Kubernetes v1.20 Benchmark v1.0.1 L1 Master
1.1.1 Ensure that the API server pod specification file permissions are set to 600 or more restrictiveUnixCIS Kubernetes Benchmark v1.9.0 L1 Master
1.1.1 Ensure that the API server pod specification file permissions are set to 600 or more restrictiveOpenShiftCIS RedHat OpenShift Container Platform v1.6.0 L1
1.1.1.2.1.1 Set 'Domain controller: Allow server operators to schedule tasks' to 'Disabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.10 Set 'Devices: Prevent users from installing printer drivers' to 'Enabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.10 Set 'Devices: Prevent users from installing printer drivers' to 'Enabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.14 Set 'Network access: Restrict anonymous access to Named Pipes and Shares' to 'Enabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.14 Set 'Network access: Restrict anonymous access to Named Pipes and Shares' to 'Enabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.25 Set 'Shutdown: Allow system to be shut down without having to log on' to 'Disabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.25 Set 'Shutdown: Allow system to be shut down without having to log on' to 'Disabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.29 Configure 'MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments)'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.29 Configure 'MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments)'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.30 Set 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' to 'Disabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.30 Set 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' to 'Disabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.33 Configure 'DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.33 Configure 'DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.54 Set 'Network access: Remotely accessible registry paths and sub-paths'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.54 Set 'Network access: Remotely accessible registry paths and sub-paths'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.60 Set 'Network access: Let Everyone permissions apply to anonymous users' to 'Disabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.60 Set 'Network access: Let Everyone permissions apply to anonymous users' to 'Disabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.68 Set 'Network access: Allow anonymous SID/Name translation' to 'Disabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.68 Set 'Network access: Allow anonymous SID/Name translation' to 'Disabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.70 Set 'Network access: Remotely accessible registry paths'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.70 Set 'Network access: Remotely accessible registry paths'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.73 Set 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' to 'Enabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.73 Set 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' to 'Enabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.74 Set 'Recovery console: Allow automatic administrative logon' to 'Disabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.1.74 Set 'Recovery console: Allow automatic administrative logon' to 'Disabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.78 Set 'Network access: Do not allow anonymous enumeration of SAM accounts' to 'Enabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.78 Set 'Network access: Do not allow anonymous enumeration of SAM accounts' to 'Enabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.3.1 Set 'Allow log on through Terminal Services' to 'Administrators'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.3.10 Set 'Adjust memory quotas for a process' to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'WindowsCIS Windows 2003 DC v3.1.0
1.1.1.2.3.10 Set 'Adjust memory quotas for a process' to 'Administrators, LOCAL SERVICE, NETWORK SERVICE'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.3.11 Configure 'Generate security audits'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.3.11 Configure 'Generate security audits'WindowsCIS Windows 2003 DC v3.1.0
1.02 Windows Oracle Local Account - 'Use Restricted Service Account (RSA)'WindowsCIS v1.1.0 Oracle 11g OS Windows Level 1
1.03 Windows Oracle Domain Account - 'Use Restricted Service Account (RSA)'WindowsCIS v1.1.0 Oracle 11g OS Windows Level 1
1.04 Windows Oracle Account - 'Deny Log on Locally Right'WindowsCIS v1.1.0 Oracle 11g OS Windows Level 1
1.05 Windows Oracle Domain Global Group - 'Create a global group for the RSA and make it the RSA's primary group'WindowsCIS v1.1.0 Oracle 11g OS Windows Level 1
1.06 Windows Oracle Account Domain Users Group Membership - 'Remove the RSA from the Domain Users group'WindowsCIS v1.1.0 Oracle 11g OS Windows Level 1