Identity & Access · IA-Q11

Question

Are privileged actions logged centrally and reviewed with alerting for anomalies?

Why This Matters

If you can’t see it, you can’t stop it. Privileged misuse must be visible and triaged.

Maturity

How to Level Up

| From → To | Actions | |—|—| |0 → 2| Centralize to SIEM; define privileged use-cases.| |2 → 3| Add alerting and review checklists with sign-off.| |3 → 4| Integrate PAM session recording and UEBA.| |4 → 5| Automate containment for known patterns.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

Common Pitfalls

Compliance Mapping