STIGhub
STIGs
RMF Controls
Compare
← All Controls
AC-2
Access Control
Rev 3
Account Management
CCI Identifiers (47)
CCI-000007
The organization manages information system accounts by identifying account types (i.e., individual, group, system, application, guest/anonymous, and temporary).
CCI-000008
The organization establishes conditions for group membership.
CCI-000009
The organization manages information system accounts by identifying authorized users of the information system and specifying access privileges.
CCI-000010
Require approvals by organization-defined personnel or roles for requests to create accounts.
CCI-000011
Create, enable, modify, disable, and remove system accounts in accordance with organization-defined procedures.
CCI-000012
Review accounts for compliance with account management requirements per organization-defined frequency.
CCI-000013
The organization manages information system accounts by notifying account managers when temporary accounts are no longer required and when information system users are terminated, transferred, or information system usage or need-to-know/need-to-share changes.
CCI-000014
The organization manages information system accounts by granting access to the system based on a valid access authorization; intended system usage; and other attributes as required by the organization or associated missions/business functions.
CCI-000237
The organization manages information system accounts by specifically authorizing and monitoring the use of guest/anonymous accounts and temporary accounts.
CCI-001354
The organization manages information system accounts by deactivating temporary accounts that are no longer required.
CCI-001355
The organization manages information system accounts by deactivating accounts of terminated or transferred users.
CCI-001547
Defines the frequency on which it will review information system accounts for compliance with account management requirements.
CCI-002110
The organization defines the information system account types that support the organizational missions/business functions.
CCI-002111
The organization identifies and selects the organization-defined information system account types of information system accounts which support organizational missions/business functions.
CCI-002112
Assign account managers.
CCI-002113
The organization establishes conditions for role membership.
CCI-002114
The organization specifies authorized users of the information system for each account.
deprecated
CCI-002115
Specify authorized users of the system.
CCI-002116
Specify authorized users of the group.
CCI-002117
Specify authorized users of the role membership.
CCI-002118
Specify authorized access authorizations (i.e., privileges) for each account.
CCI-002119
Specify organization-attributes (as required) for each account on the system.
CCI-002120
Defines the personnel or roles authorized to approve the creation of accounts.
CCI-002121
Defines the procedures to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
CCI-002122
Monitor the use of accounts.
CCI-002123
Notify account managers and organization-defined personnel or roles within an organization-defined time-period when accounts are no longer required.
CCI-002124
Notify account managers and organization-defined personnel or roles within an organization-defined time-period when users are terminated or transferred.
CCI-002125
Notify account managers and organization-defined personnel or roles within an organization-defined time-period when system usage or need-to-know changes for an individual.
CCI-002126
Authorize access to the system based on a valid access authorization.
CCI-002127
Authorize access to the system based on intended system usage.
CCI-002128
Authorize access to the system based on organization-defined attributes (as required).
CCI-002129
Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group.
CCI-003612
Define and document the types of accounts allowed and specifically prohibited for use within the system.
CCI-003613
Require organization-defined prerequisites and criteria for group membership.
CCI-003614
Require organization-defined prerequisites and criteria for role membership.
CCI-003615
Defines the prerequisites and criteria for group and role membership.
CCI-003616
Defines the attributes (as required) for each account.
CCI-003617
Create, enable, modify, disable, and remove system accounts in accordance with organization-defined policy.
CCI-003618
Create, enable, modify, disable, and remove system accounts in accordance with organization-defined criteria.
CCI-003619
Create, enable, modify, disable, and remove system accounts in accordance with organization-defined prerequisites.
CCI-003620
Defines the policy to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
CCI-003621
Defines the prerequisites to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
CCI-003622
Defines the criteria to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
CCI-003623
Defines the personnel or roles of whom to notify when accounts are no longer required; when users are terminated or transferred; and when system usage or need-to-know changes for an individual.
CCI-003624
Defines the time period of when to notify account managers for each situation.
CCI-003625
Defines the attributes (as required) for authorizing access to the system.
CCI-003626
Align account management processes with personnel termination and transfer processes.
Linked STIG Checks (67)
Across 60 STIGs. Click to expand.
▶
Apple iOS-iPadOS 16 Security Technical Implementation Guide
2 checks
▶
Apple iOS/iPadOS 15 Security Technical Implementation Guide
1 check
▶
Apple iOS/iPadOS 16 BYOAD Security Technical Implementation Guide
1 check
▶
Apple iOS/iPadOS 17 MDFPP 3.3 BYOAD Security Technical Implementation Guide
1 check
▶
Apple iOS/iPadOS 17 Security Technical Implementation Guide
2 checks
▶
Apple iOS/iPadOS 18 Security Technical Implementation Guide
1 check
▶
Apple iOS/iPadOS 26 Security Technical Implementation Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.X NDM Security Technical Implementation Guide
1 check
▶
CA API Gateway NDM Security Technical Implementation Guide
1 check
▶
Cisco ACI NDM Security Technical Implementation Guide
1 check
▶
Cisco ASA NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XR Router NDM Security Technical Implementation Guide
1 check
▶
Cisco ISE NDM Security Technical Implementation Guide
1 check
▶
Cisco NX OS Switch NDM Security Technical Implementation Guide
1 check
▶
DBN-6300 NDM Security Technical Implementation Guide
1 check
▶
Dell OS10 Switch NDM Security Technical Implementation Guide
1 check
▶
F5 BIG-IP TMOS NDM Security Technical Implementation Guide
1 check
▶
ForeScout CounterACT NDM Security Technical Implementation Guide
1 check
▶
Forescout Network Device Management Security Technical Implementation Guide
1 check
▶
Fortinet FortiGate Firewall NDM Security Technical Implementation Guide
1 check
▶
Google Android 14 COBO Security Technical Implementation Guide
1 check
▶
Google Android 14 COPE Security Technical Implementation Guide
1 check
▶
Google Android 15 COBO Security Technical Implementation Guide
1 check
▶
Google Android 15 COPE Security Technical Implementation Guide
1 check
▶
Google Android 16 COBO Security Technical Implementation Guide
1 check
▶
Google Android 16 COPE Security Technical Implementation Guide
1 check
▶
Honeywell Android 13 COBO Security Technical Implementation Guide
1 check
▶
Honeywell Android 13 COPE Security Technical Implementation Guide
1 check
▶
Honeywell Android 9.x COBO Security Technical Implementation Guide
1 check
▶
Honeywell Android 9.x COPE Security Technical Implementation Guide
1 check
▶
HPE Alletra Storage ArcusOS Network Device Management Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS NDM Security Technical Implementation Guide
1 check
▶
HYCU Protege Security Technical Implementation Guide
1 check
▶
IBM MQ Appliance v9.0 NDM Security Technical Implementation Guide
1 check
▶
Ivanti Connect Secure NDM Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide
1 check
▶
Juniper Router NDM Security Technical Implementation Guide
1 check
▶
NetApp ONTAP DSC 9.x Security Technical Implementation Guide
1 check
▶
Network Device Management Security Requirements Guide
1 check
▶
Network WLAN AP-IG Management Security Technical Implementation Guide
1 check
▶
Network WLAN AP-NIPR Management Security Technical Implementation Guide
1 check
▶
Network WLAN Bridge Management Security Technical Implementation Guide
1 check
▶
Network WLAN Controller Management Security Technical Implementation Guide
1 check
▶
Palo Alto Networks NDM Security Technical Implementation Guide
1 check
▶
Riverbed NetIM NDM Security Technical Implementation Guide
1 check
▶
Riverbed NetProfiler Security Technical Implementation Guide
1 check
▶
RUCKUS ICX NDM Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
6 checks
▶
Symantec Edge SWG NDM Security Technical Implementation Guide
1 check
▶
Symantec ProxySG NDM Security Technical Implementation Guide
1 check
▶
Trend Micro TippingPoint NDM Security Technical Implementation Guide
1 check
▶
Zebra Android 11 COBO Security Technical Implementation Guide
1 check
▶
Zebra Android 13 COPE Security Technical Implementation Guide
1 check
▶
Zebra Technologies Android 14 COBO Security Technical Implementation Guide
1 check
▶
Zebra Technologies Android 14 COPE Security Technical Implementation Guide
1 check