Identity & Access Management (expanded)47 items
Identity & Access Management (expanded)47 items
IAM → Federation & Conditional Access
Question: Is workforce identity federated to cloud/SaaS with conditional access and phishing-resistant MFA?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- ISO 27001: A.9.2.1
- SOC 2: CC6.1
Applicability: Cloud consoles and SaaS
Expected Result: No local users; SSO only; FIDO2/WebAuthn for admins; risk/device policy gates.
Why It Matters: Eliminates password reuse and reduces phish success.
Technical Breakdown:
- Disable direct logins; enforce CA; monitor impossible travel.
IAM → Service Accounts (No Shared Secrets)
Question: Are service accounts non-human, least-privileged, rotated, and auditable?
Applicable Requirements:
- NIST 800-53: IA-5, AC-6
- SOC 2: CC6.1
Applicability: Automation and integrations
Expected Result: No shared creds; unique identities; short-lived tokens; PAM/secret manager rotation.
Why It Matters: Shared/long-lived secrets are high-risk.
Technical Breakdown:
- SCIM/IGA lifecycle; vault credentials; per-service roles.
IAM → JIT Privilege Elevation
Question: Is JIT elevation enforced for admin roles with auto-revoke and session recording?
Applicable Requirements:
- NIST 800-53: AC-2(2), AC-5
- ISO 27001: A.9.2.3
Applicability: Admin access
Expected Result: No standing admins; elevation ≤ 1h; approvals; logs to SIEM.
Why It Matters: Reduces attack surface and blast radius.
Technical Breakdown:
- PAM/PIM integration; break-glass controls; rotate post-use.
IAM → Access Reviews
Question: Are quarterly access certifications performed for privileged roles/data sets?
Applicable Requirements:
- NIST 800-53: AC-2(7), AC-6
Applicability: Privileged/sensitive systems
Expected Result: Quarterly reviews; attestations and removals tracked.
Why It Matters: Prevents privilege creep.
Technical Breakdown:
- Risk-prioritize systems; auto-revoke unattended access.
IAM → Authorization Policy-as-Code
Question: Is authZ centralized as code (OPA/Cedar) with unit tests and decision logs?
Applicable Requirements:
- NIST 800-53: AC-3, SA-10
- SOC 2: CC7.2
Applicability: Microservices/APIs
Expected Result: Policies in repo; CI tests; PDP/sidecar; logs for audits.
Why It Matters: Consistency and verifiability.
Technical Breakdown:
- Dry-run before promoting; version policies with app releases.
IAM (AWS) → Root/Break-Glass Controls
Question: Are root/owner accounts locked down with HSM-backed MFA, vault storage, and no daily use?
Applicable Requirements:
- NIST 800-53: IA-2(1), AC-6
- SOC 2: CC6.1
Applicability: Cloud org roots/tenant owners
Expected Result: FIDO2 on roots; keys in vault; no API keys; monitored logins.
Why It Matters: Root compromise is catastrophic.
Technical Breakdown:
- Disable access keys; alert any root auth; require approvals.
- AWS: SSO only; disable IAM users.
- AWS: Use Permission Boundaries; SCP guardrails.
- AWS: Access Analyzer for wildcards.
Deep Dive
- AWS CLI: `aws s3api put-public-access-block --bucket <name> --public-access-block-configuration BlockPublicAcls=true,IgnorePublicAcls=true,BlockPublicPolicy=true,RestrictPublicBuckets=true`
- NIST SP 800-63B (Digital Identity Guidelines)
- AWS IAM Identity Center (SSO)
- Azure Entra Conditional Access
- Google Cloud IAM best practices
- SCIM Protocol
IAM (AWS) → Permissions Boundaries/Constraints
Question: Do you enforce org-level constraints (SCPs, Organization Policies) to prevent privilege escalation?
Applicable Requirements:
- NIST 800-53: AC-6, CM-7
- NIST CSF: PR.AC
Applicability: Cloud orgs
Expected Result: Deny wildcard admin; forbid public storage; restrict key actions.
Why It Matters: Prevents drift and toxic combos.
Technical Breakdown:
- Template guardrails; unit-test policies; attest exceptions.
- AWS: SSO only; disable IAM users.
- AWS: Use Permission Boundaries; SCP guardrails.
- AWS: Access Analyzer for wildcards.
Deep Dive
- AWS CLI: `aws s3api put-public-access-block --bucket <name> --public-access-block-configuration BlockPublicAcls=true,IgnorePublicAcls=true,BlockPublicPolicy=true,RestrictPublicBuckets=true`
- NIST SP 800-63B (Digital Identity Guidelines)
- AWS IAM Identity Center (SSO)
- Azure Entra Conditional Access
- Google Cloud IAM best practices
- SCIM Protocol
IAM (Azure) → Root/Break-Glass Controls
Question: Are root/owner accounts locked down with HSM-backed MFA, vault storage, and no daily use?
Applicable Requirements:
- NIST 800-53: IA-2(1), AC-6
- SOC 2: CC6.1
Applicability: Cloud org roots/tenant owners
Expected Result: FIDO2 on roots; keys in vault; no API keys; monitored logins.
Why It Matters: Root compromise is catastrophic.
Technical Breakdown:
- Disable access keys; alert any root auth; require approvals.
- Azure: Enforce Conditional Access; block legacy auth.
- Azure: Privileged Identity Management (PIM).
- Azure: Review risky sign-ins in Entra ID.
IAM (Azure) → Permissions Boundaries/Constraints
Question: Do you enforce org-level constraints (SCPs, Organization Policies) to prevent privilege escalation?
Applicable Requirements:
- NIST 800-53: AC-6, CM-7
- NIST CSF: PR.AC
Applicability: Cloud orgs
Expected Result: Deny wildcard admin; forbid public storage; restrict key actions.
Why It Matters: Prevents drift and toxic combos.
Technical Breakdown:
- Template guardrails; unit-test policies; attest exceptions.
- Azure: Enforce Conditional Access; block legacy auth.
- Azure: Privileged Identity Management (PIM).
- Azure: Review risky sign-ins in Entra ID.
IAM (GCP) → Root/Break-Glass Controls
Question: Are root/owner accounts locked down with HSM-backed MFA, vault storage, and no daily use?
Applicable Requirements:
- NIST 800-53: IA-2(1), AC-6
- SOC 2: CC6.1
Applicability: Cloud org roots/tenant owners
Expected Result: FIDO2 on roots; keys in vault; no API keys; monitored logins.
Why It Matters: Root compromise is catastrophic.
Technical Breakdown:
- Disable access keys; alert any root auth; require approvals.
- GCP: Use Workforce/Workload Identity Federation.
- GCP: Restrict primitive roles; use IAM Conditions.
- GCP: Organization Policies enforce constraints.
IAM (GCP) → Permissions Boundaries/Constraints
Question: Do you enforce org-level constraints (SCPs, Organization Policies) to prevent privilege escalation?
Applicable Requirements:
- NIST 800-53: AC-6, CM-7
- NIST CSF: PR.AC
Applicability: Cloud orgs
Expected Result: Deny wildcard admin; forbid public storage; restrict key actions.
Why It Matters: Prevents drift and toxic combos.
Technical Breakdown:
- Template guardrails; unit-test policies; attest exceptions.
- GCP: Use Workforce/Workload Identity Federation.
- GCP: Restrict primitive roles; use IAM Conditions.
- GCP: Organization Policies enforce constraints.
IAM (OCI) → Root/Break-Glass Controls
Question: Are root/owner accounts locked down with HSM-backed MFA, vault storage, and no daily use?
Applicable Requirements:
- NIST 800-53: IA-2(1), AC-6
- SOC 2: CC6.1
Applicability: Cloud org roots/tenant owners
Expected Result: FIDO2 on roots; keys in vault; no API keys; monitored logins.
Why It Matters: Root compromise is catastrophic.
Technical Breakdown:
- Disable access keys; alert any root auth; require approvals.
- OCI: Use Identity Domains; Federation to IdP.
- OCI: Compartment-based least privilege.
- OCI: IAM policies reviewed quarterly.
Deep Dive
- OCI CLI: `oci os bucket update --namespace <ns> --bucket-name <name> --public-access-type NoPublicAccess`
- NIST SP 800-63B (Digital Identity Guidelines)
- AWS IAM Identity Center (SSO)
- Azure Entra Conditional Access
- Google Cloud IAM best practices
- SCIM Protocol
IAM (OCI) → Permissions Boundaries/Constraints
Question: Do you enforce org-level constraints (SCPs, Organization Policies) to prevent privilege escalation?
Applicable Requirements:
- NIST 800-53: AC-6, CM-7
- NIST CSF: PR.AC
Applicability: Cloud orgs
Expected Result: Deny wildcard admin; forbid public storage; restrict key actions.
Why It Matters: Prevents drift and toxic combos.
Technical Breakdown:
- Template guardrails; unit-test policies; attest exceptions.
- OCI: Use Identity Domains; Federation to IdP.
- OCI: Compartment-based least privilege.
- OCI: IAM policies reviewed quarterly.
Deep Dive
- OCI CLI: `oci os bucket update --namespace <ns> --bucket-name <name> --public-access-type NoPublicAccess`
- NIST SP 800-63B (Digital Identity Guidelines)
- AWS IAM Identity Center (SSO)
- Azure Entra Conditional Access
- Google Cloud IAM best practices
- SCIM Protocol
IAM → Passwordless for Admins
Question: Are admins required to use passwordless auth (passkeys/WebAuthn)?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → Session Lifetime & Reauth
Question: Do sessions expire quickly with step-up for sensitive actions?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → Geo/Device Risk Policies
Question: Are risky sign-ins blocked by geo/device posture policies?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → API Access Governance
Question: Are API client IDs/secrets lifecycle-managed and reviewed?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → Contractor Access
Question: Do contractors have separated tenants/groups and time-bound access?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → Orphaned Accounts
Question: Are deprovisions enforced within 24h and sessions revoked instantly?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → Shared Mailboxes/Generic IDs
Question: Are generic/shared accounts prohibited or tightly controlled?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → Key Rotation for Signing
Question: Are token signing keys rotated with JWKS and rollover windows?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → Audit & Alerting
Question: Are critical IAM changes alerted (role grants, policy edits, MFA disabled)?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → Device Bind & Posture
Question: Is device compliance required for privileged console access?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17, AC-6
- SOC 2: CC6.1, CC7.2
Applicability: Admin and sensitive access contexts.
Expected Result: Policies configured and enforced; telemetry proves effectiveness.
Why It Matters: Stops common identity-driven attacks.
Technical Breakdown:
- Define baselines; review quarterly; integrate with SIEM.
IAM → Cloud-Specific Guardrails (AWS)
Question: Are org/tenant guardrails enforcing least privilege and preventing public exposure and escalation?
Applicable Requirements:
- NIST 800-53: CM-7, AC-6
- NIST CSF: PR.AC
Applicability: Cloud organizations/tenants.
Expected Result: Guardrails deny risky patterns (public storage, wildcard roles, key deletes).
Why It Matters: Prevents configuration drift and toxic privilege combinations.
Technical Breakdown:
- Template and test guardrails; document exceptions with expiry.
- AWS SSO Permission Sets
Deep Dive
- AWS CLI: `aws s3api put-public-access-block --bucket <name> --public-access-block-configuration BlockPublicAcls=true,IgnorePublicAcls=true,BlockPublicPolicy=true,RestrictPublicBuckets=true`
- NIST SP 800-63B (Digital Identity Guidelines)
- AWS IAM Identity Center (SSO)
- Azure Entra Conditional Access
- Google Cloud IAM best practices
- SCIM Protocol
IAM → Cloud-Specific Guardrails (Azure)
Question: Are org/tenant guardrails enforcing least privilege and preventing public exposure and escalation?
Applicable Requirements:
- NIST 800-53: CM-7, AC-6
- NIST CSF: PR.AC
Applicability: Cloud organizations/tenants.
Expected Result: Guardrails deny risky patterns (public storage, wildcard roles, key deletes).
Why It Matters: Prevents configuration drift and toxic privilege combinations.
Technical Breakdown:
- Template and test guardrails; document exceptions with expiry.
- Azure Entra Conditional Access
IAM → Cloud-Specific Guardrails (GCP)
Question: Are org/tenant guardrails enforcing least privilege and preventing public exposure and escalation?
Applicable Requirements:
- NIST 800-53: CM-7, AC-6
- NIST CSF: PR.AC
Applicability: Cloud organizations/tenants.
Expected Result: Guardrails deny risky patterns (public storage, wildcard roles, key deletes).
Why It Matters: Prevents configuration drift and toxic privilege combinations.
Technical Breakdown:
- Template and test guardrails; document exceptions with expiry.
- GCP Org Policy Constraints
IAM → Cloud-Specific Guardrails (OCI)
Question: Are org/tenant guardrails enforcing least privilege and preventing public exposure and escalation?
Applicable Requirements:
- NIST 800-53: CM-7, AC-6
- NIST CSF: PR.AC
Applicability: Cloud organizations/tenants.
Expected Result: Guardrails deny risky patterns (public storage, wildcard roles, key deletes).
Why It Matters: Prevents configuration drift and toxic privilege combinations.
Technical Breakdown:
- Template and test guardrails; document exceptions with expiry.
- OCI Compartments & Policies
Deep Dive
- OCI CLI: `oci os bucket update --namespace <ns> --bucket-name <name> --public-access-type NoPublicAccess`
- NIST SP 800-63B (Digital Identity Guidelines)
- AWS IAM Identity Center (SSO)
- Azure Entra Conditional Access
- Google Cloud IAM best practices
- SCIM Protocol
IAM → Operational Controls: SCIM Provisioning
Question: Is the following control enforced: SCIM Provisioning?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: SaaS apps that support SCIM
Expected Result: Automated JML; no manual grants
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Operational Controls: Delegated Administration
Question: Is the following control enforced: Delegated Administration?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: Business unit admins
Expected Result: Scoped, time-bound delegated roles with audit
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Operational Controls: Step-Up Authentication
Question: Is the following control enforced: Step-Up Authentication?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: Sensitive operations
Expected Result: Re-auth with WebAuthn/passkey + device attest
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Operational Controls: Session Revocation
Question: Is the following control enforced: Session Revocation?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: Termination or compromise
Expected Result: Instant JWT/session revocation and token kill
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Operational Controls: API Key Governance
Question: Is the following control enforced: API Key Governance?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: Developer keys
Expected Result: Per-app keys; rotation; usage logs; no sharing
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Operational Controls: Group Sprawl Control
Question: Is the following control enforced: Group Sprawl Control?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: Large directories
Expected Result: Attest group ownership; cap nested depth; cleanup jobs
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Operational Controls: Privileged Role Alerts
Question: Is the following control enforced: Privileged Role Alerts?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: IAM role changes
Expected Result: Realtime alerts on role grants/policy edits
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Operational Controls: Geo-Fencing
Question: Is the following control enforced: Geo-Fencing?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: Admin console access
Expected Result: Restrict to approved geos; alert anomalies
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Operational Controls: Privileged Access Reporting
Question: Is the following control enforced: Privileged Access Reporting?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: Audit needs
Expected Result: Monthly reports of all privileged sessions
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Operational Controls: FIDO Key Inventory
Question: Is the following control enforced: FIDO Key Inventory?
Applicable Requirements:
- NIST 800-53: IA-2, AC-17
- SOC 2: CC6.1, CC7.2
Applicability: Security keys fleet
Expected Result: Tracked, phishing-resistant MFA coverage >98%
Why It Matters: Improves identity hygiene and auditability.
Technical Breakdown:
- Define KPIs; auto-enforce via IdP/PAM APIs; quarterly attestations.
IAM → Advanced Controls: Privileged Browser Isolation
Question: Is the following control enforced: Privileged Browser Isolation?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: Admin consoles
Expected Result: Isolated browser or VDI for admin access
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.
IAM → Advanced Controls: MFA Fatigue Resistance
Question: Is the following control enforced: MFA Fatigue Resistance?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: Push-based MFA
Expected Result: Number matching; rate limits; context in prompts
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.
IAM → Advanced Controls: Password Policy (NIST 800-63B)
Question: Is the following control enforced: Password Policy (NIST 800-63B)?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: Password auth where still used
Expected Result: Block common passwords; no complexity games; longer length
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.
IAM → Advanced Controls: Sign-In Risk Policies
Question: Is the following control enforced: Sign-In Risk Policies?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: IdP analytics
Expected Result: Deny risky sign-ins; require step-up; investigate
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.
IAM → Advanced Controls: Device Certificate Attestation
Question: Is the following control enforced: Device Certificate Attestation?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: Managed devices
Expected Result: Device certs with attestation in IdP
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.
IAM → Advanced Controls: Human vs Non-Human Identity Split
Question: Is the following control enforced: Human vs Non-Human Identity Split?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: Directories
Expected Result: Separate OU/groups; distinct policies and reviews
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.
IAM → Advanced Controls: SSH Certificate Authorities
Question: Is the following control enforced: SSH Certificate Authorities?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: Server admin
Expected Result: Short-lived SSH certs via CA; no static keys
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.
IAM → Advanced Controls: Database Access Broker
Question: Is the following control enforced: Database Access Broker?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: DB admin/users
Expected Result: IAM/PAM-brokered access; short-lived creds; per-query audit
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.
IAM → Advanced Controls: SaaS Admin Role Minimization
Question: Is the following control enforced: SaaS Admin Role Minimization?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: SaaS platforms
Expected Result: Break glass + minimal admins per tenant
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.
IAM → Advanced Controls: Privileged Session Watermarking
Question: Is the following control enforced: Privileged Session Watermarking?
Applicable Requirements:
- NIST 800-53: IA-2, AC-6, AU-12
- SOC 2: CC6.1, CC7.2
Applicability: Admin GUIs
Expected Result: Visual watermarks; screen capture detection
Why It Matters: Protects high-value admin sessions and reduces identity attack surface.
Technical Breakdown:
- Harden MFA UX; broker DB/SSH via cert-based short-lived access; separate human/non-human identities.