Security Requirements for 03.01.01 Account Management

This requirement focuses on account management for systems and applications. The definition and enforcement of access authorizations other than those determined by account type (e.g., privileged access, non-privileged access) are addressed in 03.01.02. System account types include individual, group, temporary, system, guest, anonymous, emergency, developer, and service. Users who require administrative privileges on system accounts receive additional scrutiny by personnel responsible for approving such accounts and privileged access. Types of accounts that organizations may prohibit due to increased risk include group, emergency, guest, anonymous, and temporary. Organizations may choose to define access privileges or other attributes by account, type of account, or a combination of both. Other attributes required for authorizing access include restrictions on the time of day, day of the week, and point of origin. When defining other system account attributes, organizations consider system requirements (e.g., system upgrades, scheduled maintenance) and mission and business requirements (e.g., time zone differences, remote access to facilitate travel requirements). Users who pose a significant security risk include individuals for whom reliable evidence indicates either the intention to use authorized access to the system to cause harm or that adversaries will cause harm through them. Close coordination among mission and business owners, system administrators, human resource managers, and legal staff is essential when disabling system accounts for high-risk individuals. Time periods for the notification of organizational personnel or roles may vary. Inactivity logout is behavior- or policy-based and requires users to take physical action to log out when they are expecting inactivity longer than the defined period. Automatic enforcement of inactivity logout is addressed by 03.01.10.

View CPRT 03.01.01
  1. 03.01.01.a

    Define the types of system accounts allowed and prohibited.

  1. 03.01.01.b

    Create, enable, modify, disable, and remove system accounts in accordance with policy, procedures, prerequisites, and criteria.

  1. 03.01.01.c

    Specify:

  2. 03.01.01.c.01

    Authorized users of the system,

  3. 03.01.01.c.02

    Group and role membership, and

  4. 03.01.01.c.03

    Access authorizations (i.e., privileges) for each account.

  1. 03.01.01.d

    Authorize access to the system based on:

  2. 03.01.01.d.01

    A valid access authorization and

  3. 03.01.01.d.02

    Intended system usage.

  1. 03.01.01.e

    Monitor the use of system accounts.

  1. 03.01.01.f

    Disable system accounts when:

  2. 03.01.01.f.01

    The accounts have expired,

  3. 03.01.01.f.02

    The accounts have been inactive for [Assignment: organization-defined time period],

  4. 03.01.01.f.03

    The accounts are no longer associated with a user or individual,

  5. 03.01.01.f.04

    The accounts are in violation of organizational policy, or

  6. 03.01.01.f.05

    Significant risks associated with individuals are discovered.

  1. 03.01.01.g

    Notify account managers and designated personnel or roles within:

  2. 03.01.01.g.01

    [Assignment: organization-defined time period] when accounts are no longer required.

  3. 03.01.01.g.02

    [Assignment: organization-defined time period] when users are terminated or transferred.

  4. 03.01.01.g.03

    [Assignment: organization-defined time period] when system usage or the need-to-know changes for an individual.

  1. 03.01.01.h

    Require that users log out of the system after [Assignment: organization-defined time period] of expected inactivity or when [Assignment: organization-defined circumstances].