Skip to main content

CCC.IAM.C03: Restrict Role Assumption / Delegation

Control ID:CCC.IAM.C03
Title:Restrict Role Assumption / Delegation
Objective:Limit which principals can assume a role or impersonate a service identity to only those required. This prevents unintended cross-account or public access by securing the "who can act as this identity" boundary.
Control Family:
Identity and Access Management

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.IAM.TH02Overly-Permissive IAM PolicyAn access control policy attached to an identity or a resource is configured with excessive permissions, violating the principle of least privilege. This can enable unauthorized data access, privilege escalation, or other unintended actions by principals whose credentials might be compromised or who are acting erroneously.
1
1
0

Related Capabilities

IDTitleDescription
CCC.IAM.F02IAM UsersAbility to create, manage, list and delete IAM users. IAM user represents a single person or application.
CCC.IAM.F05IAM GroupsAbility to create, manage, list and delete IAM groups. IAM group is a collection of users, roles or other groups.
CCC.IAM.F06IAM Roles / Service PrincipalsAbility to create, manage, list and delete IAM roles. IAM role is an identity for applications or services to access resources.
CCC.IAM.F07Managed IdentitiesIdentity assigned to cloud resources (e.g., VMs, Functions) which are managed by the cloud vendor.
CCC.IAM.F10Custom RolesAbility to create, manage, list and delete custom roles. Custom roles are user-defined roles that defines what actions are allowed.
CCC.IAM.F12Policy ConditionsAbility to use conditions to add additional restrictions to the permission being granted. Allow access control rules to apply only when certain conditions are met.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.AC-3
0
-
NIST-CSF
PR.AC-4
0
-
NIST_800_53
AC-2
0
-
NIST_800_53
AC-3
0
-
NIST_800_53
AC-6
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.IAM.C03.TR01When a policy is created or updated that grants a principal permission to assume a role or impersonate a service identity, the principal MUST NOT contain a wildcard or be public/anonymous.
tlp-green
tlp-amber
tlp-red
CCC.IAM.C03.TR02When an external or unauthenticated principal tries to assume a role or impersonate a service identity, the service MUST deny the action.
tlp-green
tlp-amber
tlp-red