Benchmark: Privileged User Accounts AC-2(7)
Description
The organization establishes and administers privileged user accounts in accordance with a role-based access scheme that organizes allowed information system access and privileges into roles, monitors privileged role assignments, and takes organization-defined actions when privileged role assignments are no longer appropriate.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-azure-complianceStart the Powerpipe server:
steampipe service startpowerpipe serverOpen http://localhost:9033 in your browser and select Privileged User Accounts AC-2(7).
Run this benchmark in your terminal:
powerpipe benchmark run azure_compliance.benchmark.nist_sp_800_53_rev_5_ac_2_7Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_compliance.benchmark.nist_sp_800_53_rev_5_ac_2_7 --shareControls
- Cognitive Services accounts should have local authentication methods disabled
 - Audit usage of custom RBAC roles
 - Service Fabric clusters should only use Azure Active Directory for client authentication
 - An Azure Active Directory administrator should be provisioned for SQL servers