Skip to content
English
  • There are no suggestions because the search field is empty.

CAF – B2.c Privileged User Management

This article provides additional information on how you can meet the requirement for the CAF control – B2.c Privileged User Management.

Controlling Privileged Access

  • Strict controls should be applied to privileged access for systems and services that support managed service operations.
  • Privileged activities should only be carried out using dedicated admin accounts, separate from day-to-day user accounts.
  • These accounts should be protected using:
    • multi-factor authentication (MFA)

    • conditional access policies

    • strong authentication through solutions such as Microsoft Entra ID, Okta or JumpCloud

Secure Administrative Devices

  • Privileged access should be restricted to hardened devices such as Privileged Access Workstations (PAWs) or devices managed through Intune, Datto RMM, NinjaOne or Jamf.

  • All privileged access paths (e.g. RDP, SSH, Azure Portal, hypervisor consoles) should be monitored and logged.

  • Privileged roles should be segregated to ensure no single individual has end-to-end control of critical systems without oversight.

Temporary and Third-Party Privileged Access

  • Temporary or time-bound privileged access should only be granted when necessary, using Just-in-Time (JIT) tools such as Microsoft PIM or Admin-by-Request.

  • Third-party support access should only be enabled when required, should be time-limited, and must be closely monitored.

Reviewing Privileged Roles

  • Privileged roles and access rights should be reviewed regularly.

  • Updates should be applied automatically as part of the joiners, movers and leavers process.

  • Access reviews should be carried out using tools such as Entra ID Access Reviews to ensure privileged rights remain appropriate.

Monitoring Privileged Activity

  • All privileged activity — including system configuration changes, administrative commands and remote access — should be logged and monitored using tools such as:
    • Microsoft Defender

    • SIEM / Sentinel

    • Splunk

    • Datto

  • Logs should be retained for offline review and used to support investigations and continuous improvement.