🕸️ Ada Research Browser

AC.L2-3.1.5-Evidence.md
← Back

Evidence – AC.L2-3.1.5

Employ the Principle of Least Privilege


What This Evidence Shows

This evidence shows that users, roles, and system accounts only have the minimum access needed to do their jobs and do not have extra or unnecessary permissions.

This supports AC.L2-3.1.5 (Least Privilege) in the System Security Plan (SSP).


How Least Privilege Is Demonstrated

1. Users Only Have Access They Need

Users are assigned access based on their job role. They are not given permissions “just in case” or because it is convenient.

Examples of how this is shown:

If a user does not need access to something, they are not given access.


2. Administrative Permissions Are Limited

Administrative permissions are only given to users whose job requires them.

Examples of how this is shown:

Most users have no administrative permissions at all.


3. Permissions Match Job Responsibilities

Access permissions match what a person actually does for work.

Examples of how this is shown:

No user has broad or “all access” permissions unless their role truly requires it.


4. Access Is Reviewed and Cleaned Up

Permissions are reviewed periodically and when someone’s job changes.

Examples of how this is shown:

This prevents users from slowly accumulating more access than necessary.


Where This Evidence Exists

This evidence exists in the organization’s identity and access management system (such as Microsoft Entra ID or Google Workspace Admin Console) and supporting access review records.

Evidence is retained according to organizational policy and is available for assessment.