Access Control 3.1.7 (3.1.7)
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
Get Full GuidanceWhat Is This CMMC Control?
This control requires organizations to prevent regular users from performing administrative or security-critical functions, and to log whenever such privileged functions are executed. This ensures that only authorized personnel can perform sensitive operations like creating accounts, modifying security settings, or managing encryption keys, while maintaining an audit trail of all privileged activities for security monitoring and incident investigation.
Control Intent
Prevent unauthorized execution of privileged functions and maintain accountability through audit logging to detect and respond to potential misuse, insider threats, or compromised accounts.
Who This Control Applies To
- •All systems processing, storing, or transmitting CUI
- •All user accounts with access to CUI systems
- •All privileged accounts and administrative functions
- •Operating systems, applications, databases, and network devices
- •Cloud infrastructure and SaaS platforms where privileged functions exist
- •Remote access systems and jump servers
Not Applicable When
- •Systems that have no privileged functions or administrative capabilities
- •Stand-alone systems with no user accounts or authentication mechanisms
- •Systems where all users are privileged users by documented business necessity (extremely rare and requires strong justification)
Key Objectives
- 1Prevent non-privileged users from executing privileged functions through technical enforcement mechanisms
- 2Capture and log all executions of privileged functions to enable detection of misuse and support incident investigation
- 3Establish clear separation between privileged and non-privileged user capabilities to reduce attack surface and limit damage from compromised accounts
Sample Self-Assessment Questions (Partial)
Does your organization use separate accounts for administrative tasks versus regular work activities?
Are regular user accounts prevented from installing software, changing security settings, or creating new accounts?
Implementation Approaches (High-Level)
Operating System Privilege Separation with Centralized Logging
Use built-in OS privilege separation mechanisms (Windows UAC, Linux sudo, macOS privilege escalation) combined with centralized audit logging to SIEM or log management platform
Cloud IAM with CloudTrail/Activity Logging
Use cloud provider IAM to enforce least privilege and enable comprehensive API/activity logging for all privileged operations
Privileged Access Management (PAM) Solution
Deploy dedicated PAM platform to manage, control, and audit all privileged access and function execution
Application-Level RBAC with Audit Logging
Implement role-based access control within applications to separate privileged functions and log all privileged operations
Network Device Privilege Separation with TACACS+/RADIUS
Use AAA protocols to enforce privilege levels on network devices and centrally log all privileged command execution
Evidence & Assessment Notes
Expected Evidence
Organizations should maintain documentation and evidence demonstrating compliance with this control. This may include policy documentation, configuration records, audit logs, access reviews, and other relevant artifacts that show how the control is implemented and maintained.
Plan of Action & Milestones (POA&M)
If privilege separation is not technically enforced, document specific systems affected, root cause (technical limitation, resource constraint, legacy system), and remediation plan with milestones If privileged function logging is incomplete, identify which system types or functions are not logged, plan for enabling comprehensive logging, and establish interim compensating controls (manual reviews, restricted access) If logs are not centralized, document plan to implement log forwarding and SIEM integration with timeline and resource requirements For legacy systems that cannot enforce privilege separation, document compensating controls such as enhanced monitoring, restricted network access, or migration/replacement plans If privileged accounts cannot be eliminated, document business justification, additional monitoring controls, and periodic access reviews Include specific technical milestones (e.g., deploy PAM solution, configure CloudTrail, enable audit policies) rather than generic statements Address both prevention of privileged function execution by non-privileged users AND logging of privileged function execution as separate POA&M items if needed Consider phased approach: critical systems first, then expand to all in-scope systems Document interim risk acceptance if full implementation requires significant time or resources
Frequently Asked Questions
What exactly are privileged functions that need to be protected and logged?
Privileged functions are administrative or security-critical operations that can significantly impact system security or integrity. Examples include creating or modifying user accounts, changing security configurations, installing software, performing system backups or restores, managing encryption keys, modifying audit settings, accessing sensitive data repositories, and conducting system integrity checks. The specific privileged functions vary by system type and should be documented in your system security plan.
Does this control require that we eliminate all administrative access for regular users?
Yes, non-privileged users should not have the ability to execute privileged functions. Regular users should operate with standard user accounts that have only the permissions necessary for their job functions. When administrative tasks are needed, users should either request assistance from authorized administrators or use a separate privileged account (if authorized) that is logged and monitored. The goal is to prevent both intentional and accidental misuse of privileged functions.
Is it sufficient to log when someone logs in with a privileged account, or do we need to log each privileged action?
You must log the actual execution of privileged functions, not just authentication to privileged accounts. Simply logging that an administrator logged in does not satisfy this control. The audit logs must capture what privileged functions were executed, by whom, when, and the result. This granular logging enables detection of specific misuse or unauthorized actions even by legitimately authenticated privileged users.
How do we handle situations where users need temporary administrative access to perform their jobs?
Temporary administrative access should be managed through formal processes such as privilege elevation workflows, just-in-time access provisioning, or privileged access management (PAM) solutions. The key requirements are that the elevation is logged, time-limited, justified, and ideally requires approval. Users should not maintain persistent administrative privileges. All privileged functions executed during the temporary elevation must be logged with the individual user's identity, not a shared account.
What should we do if our legacy systems cannot technically enforce privilege separation or logging?
Legacy systems that cannot meet this control represent a compliance gap that must be addressed through a Plan of Action and Milestones (POA&M). Document the specific technical limitations, implement compensating controls where possible (such as network isolation, enhanced monitoring, or restricted access), and establish a timeline for remediation through system upgrades, replacements, or migration. Compensating controls alone may not be sufficient for CMMC certification depending on the assessor's evaluation and the system's role in protecting CUI.
Do cloud services and SaaS applications need to comply with this control?
Yes, if cloud services or SaaS applications process, store, or transmit CUI, they must comply with this control. You must ensure that non-privileged users cannot execute administrative functions in these platforms and that all privileged operations (such as user management, security configuration changes, or data exports) are logged. This typically involves configuring role-based access control in the cloud/SaaS admin console and enabling audit logging features, then exporting those logs to your centralized logging infrastructure for retention and monitoring.
How ConformatIQ Helps With CMMC Readiness
ConformatIQ is an AI-assisted CMMC readiness platform designed to help organizations prepare for assessments more efficiently. The platform supports document generation such as SSPs and POA&Ms, guided readiness workflows, centralized evidence tracking, and interview preparation for assessments.
Ready to Get Full Guidance?
Access complete implementation details, detailed assessment questions, evidence requirements, and expert guidance for this control.
Request Full GuidanceInformation sourced from NIST SP 800-171 Rev. 2. See full disclaimer.