All Controls
Security Control

Access Control & Least Privilege

NIST ProtectPR.AC-4CIS Control 6: Access Control Management

What This Control Means

Access control is the practice of restricting system and data access to only those individuals who need it to perform their job functions. The principle of least privilege states that every user, application, and process should operate with the minimum set of permissions necessary, no more, no less. This limits the blast radius when an account is compromised and reduces the likelihood of accidental data exposure.

Role-based access control (RBAC) is the most practical model for small and mid-sized organizations. Under RBAC, permissions are assigned to defined roles (e.g., 'Sales Rep,' 'Finance Manager,' 'IT Admin') rather than to individual users. When an employee changes roles, their permissions are updated by reassigning their role rather than manually adjusting dozens of individual access rights.

Privileged accounts, those with administrative access to systems, networks, or data, require special handling. Admin credentials should be separate from daily-use accounts, stored in a privileged access management (PAM) solution, and used only when administrative tasks are required. The practice of using an admin account for everyday email and web browsing is one of the most dangerous habits in any organization.

Documenting access control policies is as important as implementing them technically. A written policy should define who approves access requests, how access is granted and revoked, and what constitutes appropriate use. Without documentation, access decisions become ad hoc, inconsistent, and impossible to audit, all of which create risk and compliance gaps.

Why Insurers Care

Insurers evaluate access control maturity because overly permissive access is a root cause of insider threats and lateral movement during breaches. Applications commonly ask whether the organization follows the principle of least privilege and whether administrative access is restricted to dedicated accounts.

Organizations that can demonstrate documented access control policies, role-based permissions, and separation of administrative and standard accounts are viewed as lower-risk by underwriters. In claims investigations, insurers examine whether excessive access contributed to the scope of a breach, and findings of poor access control can affect coverage decisions.

Industry-Specific Notes

Healthcare (HIPAA)

HIPAA's minimum necessary standard (45 CFR 164.502(b)) requires that access to protected health information be limited to the minimum necessary to accomplish the intended purpose. Role-based access is the standard approach for EHR systems. OCR enforcement actions have cited overly broad access as a contributing factor in breach investigations.

Legal (ABA Guidelines)

Ethical walls (also called information barriers) are a critical access control requirement in law firms handling matters with potential conflicts of interest. The ABA Model Rules require firms to implement measures that prevent unauthorized access to confidential client information across practice groups.

Financial Services (GLBA/PCI-DSS)

The GLBA Safeguards Rule requires financial institutions to restrict access to customer information to authorized personnel only. Segregation of duties is a core principle. No single individual should be able to initiate and approve financial transactions. SOX compliance for publicly traded companies requires documented access controls over financial reporting systems.

Retail / E-commerce (PCI-DSS)

PCI-DSS Requirement 7 mandates that access to cardholder data be restricted to personnel whose jobs require it. Access must be granted on a need-to-know basis, and all access must be documented and authorized by management. Point-of-sale system access must be tightly controlled to prevent skimming and fraud.

Government / Defense (CMMC 2.0)

NIST 800-171 control AC.L2-3.1.5 requires the principle of least privilege, and AC.L2-3.1.2 requires limiting system access to authorized transactions and functions. CMMC Level 2 assessors verify that access control policies are not only documented but technically enforced and regularly audited.

Implementation Steps

Document an access control policy that defines roles, approval workflows, and the principle of least privilege

Implement role-based access control (RBAC) in all major systems, mapping job functions to permission sets

Separate administrative accounts from daily-use accounts for all IT staff

Require manager approval for all access requests and maintain an access request log

Review and remove unnecessary permissions when employees change roles or responsibilities

Want to know how your organization measures up on this control?

Take the free assessment →