3.1.6 — Two Hats, Two Accounts
What It Says
Section titled “What It Says”Use non-privileged accounts or roles when accessing nonsecurity functions.
What It Actually Means
Section titled “What It Actually Means”Simple rule: admins have two accounts.
Account 1: Regular user account. For email, web browsing, Teams, documents — everything that isn’t system administration.
Account 2: Admin account. Only used when performing admin tasks — configuring systems, managing accounts, changing security settings.
Why? If an admin clicks a phishing link while browsing with a domain admin account, the attacker gets domain admin. If they’re using their regular account, the attacker gets a standard user — annoying, but containable.
Pass or Fail
Section titled “Pass or Fail”Your assessor needs a “yes” to every row:
| # | Question | What “yes” looks like |
|---|---|---|
| 1 | Are nonsecurity functions identified? | You’ve defined which tasks don’t need elevated access |
| 2 | Do admins use non-privileged accounts for those functions? | They actually switch accounts — and you can prove it |
What to Have Ready on Assessment Day
Section titled “What to Have Ready on Assessment Day”Documents they’ll review: Access control policy, least privilege procedures, system security plan, list of security functions assigned to privileged accounts, system configuration, audit logs
People they’ll talk to: Personnel defining least privilege, security staff, sysadmins
Live demos they’ll ask for: “Show me that your admin uses a separate account for email and browsing.”
The Assessor’s Playbook
Section titled “The Assessor’s Playbook”These are the actual questions. Have answers ready.
- “Are nonsecurity functions and non-privileged roles defined?”
- “How do you verify that admins only use privileged accounts for security functions?”
- “Can you show me that admin accounts are separate from daily-use accounts?”
Where Companies Trip Up
Section titled “Where Companies Trip Up”One account for everything. Admins using their privileged account to check email, browse the web, and do admin work. Most common failure.
No enforcement. Policy says use separate accounts but nothing stops the admin from using the privileged one for everything.
Shared admin accounts. Multiple people logging in as “admin” — impossible to trace actions to individuals.
How to Talk About This
Section titled “How to Talk About This”Connected Requirements
Section titled “Connected Requirements”| Requirement | Why it matters here |
|---|---|
| 3.1.5 — Minimum Necessary | The principle behind minimum access |
| 3.1.7 — Log the Admin Work | Logs when admin functions are executed |
| 3.3.2 — Trace Every Action | Tracing actions to individuals |
Implementation
Section titled “Implementation”Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.
Start a conversation →CMMC Practice ID: AC.L2-3.1.6 | SPRS Weight: 1 point | POA&M Eligible: Yes