Identity & Access · IA-Q06

Question

Is least privilege enforced through RBAC/ABAC across major systems and apps?

Why This Matters

Excess entitlements enlarge attack surface and audit scope; RBAC operationalizes least privilege.

Maturity

How to Level Up

| From → To | Actions | |—|—| |0 → 2| Build a role catalog; map job families → roles.| |2 → 3| Enforce role-based requests; block direct grants.| |3 → 4| Introduce ABAC/OPA for sensitive workflows.| |4 → 5| Add analytics to remove unused entitlements.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

Common Pitfalls

Compliance Mapping