🏛️NIST 800-53 IA-2Rule: NIST-IA-002critical

Identification and Authentication (Organizational Users)

Description

Uniquely identify and authenticate organizational users and associate that unique identification with processes acting on behalf of those users.

⚠️ Risk Impact

Shared accounts destroy accountability. Generic 'admin' or 'devops' accounts make it impossible to attribute actions to individuals — for forensics, for audit, or for compliance.

🔍 How EchelonGraph Detects This

NIST-IA-002Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as critical-severity findings with remediation guidance.

🔧 Remediation

Eliminate shared accounts. Every user has unique credentials. Service accounts have documented purpose + owner. MFA enforced via IdP. Federate everywhere — local users only with strong justification.

💀 Real-World Attack Scenario

A government cloud environment had a shared 'admin' account used by 14 contractors. When a security incident occurred, forensics could not determine which individual had taken the action. Without attribution, no disciplinary or remediation action was possible. The agency had to retain all 14 contractors despite serious concerns about one of them.

💰 Cost of Non-Compliance

Shared-account audit findings: blocks FedRAMP authorization. Average remediation: 4-6 weeks. HIPAA §164.312(a)(2)(i) violations involve mandatory breach notification.

📋 Audit Questions

  • 1.Are any production accounts shared between users?
  • 2.How are service accounts attributed to owners?
  • 3.Show MFA enforcement evidence per user.
  • 4.What is the rate of unique-identity authentication?

🎯 MITRE ATT&CK Mapping

T1078 — Valid AccountsT1078.003 — Local Accounts

⚡ Common Pitfalls

  • Shared service accounts in CI/CD shared across teams
  • Generic database users like 'app_user' used by multiple services
  • Break-glass admin account used routinely instead of for emergencies

📈 Business Value

Unique identification is the foundation of accountability. Without it, no other control can be meaningfully audited.

⏱️ Effort Estimate

Manual

20-40 hours to eliminate shared accounts + automate provisioning

With EchelonGraph

EchelonGraph identifies shared accounts and accounts without MFA across cloud + SaaS

🔗 Cross-Framework References

SOC2-CC6.1PCI-8.1HIPAA-164.312(a)(2)(i)

Automate NIST 800-53 IA-2 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →