Skip to main content

CCC.IAM.C09: Enforce Federated Single Sign-On (SSO) for Human Users

Control ID:CCC.IAM.C09
Title:Enforce Federated Single Sign-On (SSO) for Human Users
Objective:Ensure that all human users must authenticate through a central, federated Identity Provider (IdP) to access the cloud environment. This eliminates cloud-native user accounts with long-lived passwords, centralizes authentication controls, and simplifies lifecycle management.
Control Family:
Identity Provisioning and Lifecycle

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.IAM.TH01Valid Cloud Credentials AbuseValid identity credentials such as access keys, tokens or passwords are misused or compromised. Examples include public exposure, token theft, unprotected metadata service of a compromised compute instance or brute-force attacks. The use of these credentials can provide unauthorized access to the cloud environment, potentially bypassing other security controls and enabling lateral movement across cloud resources.
1
1
0
CCC.IAM.TH09Long-Lived Static CredentialsLong-lived static credentials such as access keys for an identity are used and not rotated periodically according to security best practices, extending exposure in the event of credentials compromise.
1
1
0

Related Capabilities

IDTitleDescription
CCC.IAM.F02IAM UsersAbility to create, manage, list and delete IAM users. IAM user represents a single person or application.
CCC.IAM.F03Long-Term CredentialsAbility to create, manage, list and delete long-term credentials such as access keys and service account keys.
CCC.IAM.F04Password ManagementAbility to create, change and delete IAM user passwords.
CCC.IAM.F07Managed IdentitiesIdentity assigned to cloud resources (e.g., VMs, Functions) which are managed by the cloud vendor.
CCC.IAM.F08Federated Identity - SAMLSupport for user authentication outside the cloud service provider using SAML. Authenticated federated identities can assume IAM roles.
CCC.IAM.F09Federated Identity - OIDCSupport for user authentication outside the cloud service provider using OIDC. Authenticated federated identities can assume IAM roles.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.AA-01
0
-
NIST_800_53
IA-2
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.IAM.C09.TR01When a human user accesses the cloud environment, they MUST authenticate through the organization's federated IdP via a standard protocol (e.g., SAML, OIDC).
tlp-clear
tlp-green
tlp-amber
tlp-red