Identity and Access Management¶
Automating Account Management¶
KSI-IAM-AAM
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
The lifecycle and privileges of all accounts, roles, and groups are securely managed using automation.
Related SP 800-53 Controls: AC-2.2, AC-2.3, AC-2.13, AC-6.7, IA-4.4, IA-12, IA-12.2, IA-12.3, IA-12.5
Adopting Passwordless Methods¶
KSI-IAM-APM
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Secure passwordless methods are used for user authentication and authorization when feasible, otherwise strong passwords with phishing-resistant MFA is used.
Related SP 800-53 Controls: AC-3, IA-5.1, IA-5.2, IA-5.6, IA-6, AC-2, IA-2, IA-2.1, IA-2.2, IA-2.8, IA-5, IA-8, SC-23
Ensuring Least Privilege¶
KSI-IAM-ELP
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Identity and access management measures are used and persistently reviewed to ensure each user or device can only access the resources they need.
Related SP 800-53 Controls: AC-2.5, AC-2.6, AC-3, AC-4, AC-6, AC-12, AC-14, AC-17, AC-17.1, AC-17.2, AC-17.3, AC-20, AC-20.1, CM-2.7, CM-9, IA-2, IA-3, IA-4, IA-4.4, IA-5.2, IA-5.6, IA-11, PS-2, PS-3, PS-4, PS-5, PS-6, SC-4, SC-20, SC-21, SC-22, SC-23, SC-39, SI-3
Terms: Persistently
Authorizing Just-in-Time¶
KSI-IAM-JIT
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
A least-privileged, role and attribute-based, and just-in-time security authorization model is used and persistently reviewed for all user and non-user accounts and services.
Related SP 800-53 Controls: AC-2, AC-2.1, AC-2.2, AC-2.3, AC-2.4, AC-2.6, AC-3, AC-4, AC-5, AC-6, AC-6.1, AC-6.2, AC-6.5, AC-6.7, AC-6.9, AC-6.10, AC-7, AC-20.1, AC-17, AU-9.4, CM-5, CM-7, CM-7.2, CM-7.5, CM-9, IA-4, IA-4.4, IA-7, PS-2, PS-3, PS-4, PS-5, PS-6, PS-9, RA-5.5, SC-2, SC-23, SC-39
Terms: Persistently
Securing Non-User Authentication¶
KSI-IAM-SNU
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Appropriately secure authentication methods are used and persistently reviewed for non-user accounts and services.
Related SP 800-53 Controls: AC-2, AC-2.2, AC-4, AC-6.5, IA-3, IA-5.2, RA-5.5
Terms: Persistently
Responding to Suspicious Activity¶
KSI-IAM-SUS
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Accounts with privileged access are disabled or otherwise secured in response to suspicious activity.
Related SP 800-53 Controls: AC-2, AC-2.1, AC-2.3, AC-2.13, AC-7, PS-4, PS-8
Terms: Vulnerability Response