Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family AC

AC-2Account Management

Define and document the types of accounts allowed and specifically prohibited for use within the system; Assign account managers; Require {{ insert: param, ac-02_odp.01 }} for group and role membership; Specify: Authorized users of the system; Group and role membership; and Access authorizations (i.e., privileges) and {{ insert: param, ac-02_odp.02 }} for each account; Require approvals by {{ insert: param, ac-02_odp.03 }} for requests to create accounts; Create, enable, modify, disable, and remove accounts in accordance with {{ insert: param, ac-02_odp.04 }}; Monitor the use of accounts; Notify account managers and {{ insert: param, ac-02_odp.05 }} within: {{ insert: param, ac-02_odp.06 }} when accounts are no longer required; {{ insert: param, ac-02_odp.07 }} when users are terminated or transferred; and {{ insert: param, ac-02_odp.08 }} when system usage or need-to-know changes for an individual; Authorize access to the system based on: A valid access authorization; Intended system usage; and {{ insert: param, ac-02_odp.09 }}; Review accounts for compliance with account management requirements {{ insert: param, ac-02_odp.10 }}; Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group; and Align account management processes with personnel termination and transfer processes.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (2)

ATT&CK techniques this control mitigates (218)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-862Missing Authorization8,680Requiring approvals for account creation and specifying authorizations ensures authorization is not missing for system access.
CWE-284Improper Access Control4,832Defining account types, requiring approvals for creation, specifying authorizations, monitoring usage, and reviewing accounts directly prevents improper access control by ensuring only authorized accounts exist and are used.
CWE-863Incorrect Authorization3,234Monitoring account use, notifying on changes, and reviewing accounts for compliance corrects incorrect authorization assignments.
CWE-269Improper Privilege Management2,907Assigning group/role memberships and access authorizations (privileges) while reviewing accounts addresses improper privilege management.
CWE-285Improper Authorization1,230Specifying access authorizations for each account and requiring approvals for account requests enforces proper authorization decisions.
CWE-266Incorrect Privilege Assignment826Explicitly specifying privileges and group/role memberships for accounts reduces the risk of incorrect privilege assignments.
CWE-250Execution with Unnecessary Privileges305Reviewing accounts for compliance, disabling/removing unneeded accounts, and aligning with termination processes prevents execution with unnecessary privileges.
CWE-272Least Privilege Violation25Requiring specification of intended system usage and access authorizations, plus periodic reviews, supports enforcement of least privilege.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-84894.99.80.4926good
CVE-2024-548802.29.10.0552good
CVE-2026-318742.09.80.0023good
CVE-2025-128822.09.80.0011good
CVE-2025-114572.09.80.0017good
CVE-2025-145332.09.80.0015good
CVE-2024-96362.09.80.0076good
CVE-2025-01772.09.80.0031good
CVE-2024-134212.09.80.0024good
CVE-2025-136752.09.80.0018good
CVE-2024-122812.09.80.0025good
CVE-2024-119512.09.80.0025good
CVE-2025-137642.09.80.0019good
CVE-2025-135592.09.80.0021good
CVE-2025-22322.09.80.0006good
CVE-2025-136182.09.80.0007good
CVE-2026-09202.09.80.0006good
CVE-2025-67582.09.80.0031good
CVE-2025-69942.09.80.0027good
CVE-2025-342172.09.80.0017good
CVE-2025-354522.09.80.0015good
CVE-2024-464331.88.80.0097good
CVE-2024-574341.88.80.0021good
CVE-2024-464291.88.80.0020good
CVE-2026-356071.68.10.0008good

Other controls in family AC

AC-1 AC-10 AC-11 AC-12 AC-13 AC-14 AC-15 AC-16 AC-17 AC-18 AC-19 AC-20 AC-21 AC-22 AC-23 AC-24 AC-25 AC-3 AC-4 AC-5 AC-6 AC-7 AC-8 AC-9