Skip to main content

CCC.IAM.C11: Enable Continuous IAM Access and Usage Analysis

Control ID:CCC.IAM.C11
Title:Enable Continuous IAM Access and Usage Analysis
Objective:Enable and configure the cloud provider's native access and usage analysis services to continuously monitor for external access paths and internal unused access.
Control Family:
Logging and Monitoring

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.IAM.TH02Overly-Permissive IAM PolicyAn access control policy attached to an identity or a resource is configured with excessive permissions, violating the principle of least privilege. This can enable unauthorized data access, privilege escalation, or other unintended actions by principals whose credentials might be compromised or who are acting erroneously.
1
1
0
CCC.IAM.TH10Orphaned Federated Identity Retains AccessA federated identity is de-provisioned from the external Identity Provider (IdP), but its corresponding cloud identity remains active within the cloud environment. This orphaned identity creates a latent access path that could be exploited if the original username is reactivated or reassigned in the IdP, granting unintended access to a new principal.
1
1
0
CCC.IAM.TH11Unused CredentialsUnused IAM identity that is no longer needed or monitored remains active. Its compromise is less likely to be detected, and it represents a persistent, unnecessary attack surface.
1
1
0

Related Capabilities

IDTitleDescription
CCC.IAM.F02IAM UsersAbility to create, manage, list and delete IAM users. IAM user represents a single person or application.
CCC.IAM.F05IAM GroupsAbility to create, manage, list and delete IAM groups. IAM group is a collection of users, roles or other groups.
CCC.IAM.F06IAM Roles / Service PrincipalsAbility to create, manage, list and delete IAM roles. IAM role is an identity for applications or services to access resources.
CCC.IAM.F07Managed IdentitiesIdentity assigned to cloud resources (e.g., VMs, Functions) which are managed by the cloud vendor.
CCC.IAM.F10Custom RolesAbility to create, manage, list and delete custom roles. Custom roles are user-defined roles that defines what actions are allowed.
CCC.IAM.F12Policy ConditionsAbility to use conditions to add additional restrictions to the permission being granted. Allow access control rules to apply only when certain conditions are met.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
ID.RA-01
0
-
NIST-CSF
ID.IM-01
0
-
NIST_800_53
AC-2
0
-
NIST_800_53
CA-7
0
-
NIST_800_53
RA-5
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.IAM.C11.TR01When a cloud account or organization is provisioned, the native automated access and usage analysis services MUST be enabled to continuously monitor for external or public access to resources, and unused access.
tlp-clear
tlp-green
tlp-amber
tlp-red