Gitlab hero border pattern left svg Gitlab hero border pattern right svg

IAM.3.03 - Service Account Restrictions Control Guidance

IAM.3.03 - Service Account Restrictions

Control Statement

Individual user or administrator use of service accounts for O/S, applications, and databases is prohibited.

Context

Preventing interactive login via a service accounts by individual users and administrators reduces the risk of unauthorized access to systems and data. In many cases, service accounts are set up with highly privileged access and therefore, this control aims to prevent the hijacking of that access by individuals who otherwise would not have it. All service accounts should be set by default to do not allow login and monitoring should be in place to alert in the event an account is set to allow interactive login.

Scope

This control applies to all systems within our production environment. The production environment includes all endpoints and cloud assets used in hosting GitLab.com and its subdomains. This may include third-party systems that support the business of GitLab.com.

Ownership

Control owner:

Process owner:

Guidance

All service accounts should be set by default to do not allow interactive login

Additional control information and project tracking

Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the Remote Connections control issue.

Policy Reference

Framework Mapping