Privilege Management Infrastructure

Privilege Management Infrastructure ensures users have access and privileges required to execute their duties and responsibilities with Identity and Access Management (IAM) functions such as identity management, authentication services, authorization services, and privilege usage management. This security discipline enables the right individuals to access the right resources at the right times for the right reasons. It addresses the mission-critical need to ensure appropriate access to resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.

This security practice is a crucial undertaking for any enterprise.

The technical controls of Privilege Management Infrastructure focus on identity provisioning, password and multi-factor authentication, policy management and more.

It is also increasingly business-aligned, and it requires business skills, not just technical expertise.

Cloud Controls Matrix (CCM) Data

Array

IS-29 | Information Security | Audit Tools Access

Control Specification +-

Access to, and use of, audit tools that interact with the organizations information systems shall be appropriately segmented and restricted to prevent compromise and misuse of log data.

Architectural Relevance +-

PhysicalNetworkComputeAppData
True True True True True

Corp Gov Relevance +-

Corp Gov Relevance
False

Cloud Service Delivery Model Applicability +-

SaaSPaaSIaaS
True True True

Supplier Relationship +-

Service ProviderTenant / Consumer
True False

Scope Applicability +-

COBIT 4.1HIPAA / HITECH ActISO/IEC 27001-2005

DS 5.7

A.15.3.2

NIST SP800-53 R3FedRAMP (Final 2012) Low ImpactFedRAMP (Final 2012) Moderate ImpactPCI DSS v2.0

AU-9
AU-11
AU-14

NIST SP 800-53 R3 AU-9

NIST SP 800-53 R3 AU-9
NIST SP 800-53 R3 AU-9 (2)

10.5.5

BITS Shared Assessments SIG v6.0BITS Shared Assessments SIG v5.0GAPP (Aug 2009)

8.2.1

Jericho ForumNERC CIP

Commandment #2
Commandment #5
Commandment #11

CIP-003-3 - R5.2

Array

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Information Security (IS) | ID #IS-29.1

Do you restrict, log, and monitor access to your information security management systems? (Ex. Hypervisors, firewalls, vulnerability scanners, network sniffers, APIs, etc.)

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS 5.7

A.15.3.2

NIST SP800-53 R3 AU-9
NIST SP800-53 R3 AU-11
NIST SP800-53 R3 AU-14

FedRAMPPCI_DSSBITSGAPP

NIST SP800-53 R3 AU-9
NIST SP800-53 R3 AU-9 (2)
NIST SP800-53 R3 AU-11
NIST SP800-53 R3 AU-14

PCI DSS v2.0 10.5.5

GAPP Ref 8.2.1

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True