Anthropic-Cybersecurity-Skills performing-privileged-account-access-review
Conduct systematic reviews of privileged accounts to validate access rights, identify excessive permissions,
git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills
T=$(mktemp -d) && git clone --depth=1 https://github.com/mukul975/Anthropic-Cybersecurity-Skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/performing-privileged-account-access-review" ~/.claude/skills/mukul975-anthropic-cybersecurity-skills-performing-privileged-account-access-rev && rm -rf "$T"
skills/performing-privileged-account-access-review/SKILL.mdPerforming Privileged Account Access Review
Overview
Privileged Account Access Review is a critical identity governance process that validates whether users with elevated permissions still require their access. This review covers domain admins, service accounts, database administrators, cloud IAM roles, and application-level privileged accounts. Regular access reviews are mandated by SOC 2, PCI DSS, HIPAA, and SOX compliance frameworks, typically required quarterly for high-privilege accounts.
When to Use
- When conducting security assessments that involve performing privileged account access review
- When following incident response procedures for related security events
- When performing scheduled security testing or auditing activities
- When validating security controls through hands-on testing
Prerequisites
- PAM solution deployed (CyberArk, BeyondTrust, Delinea, or equivalent)
- Identity governance platform (SailPoint, Saviynt, or equivalent)
- Complete inventory of privileged accounts across all platforms
- Defined access review policy with SLAs and escalation procedures
- Designated reviewers (account owners, managers, security team)
Core Concepts
Privileged Account Categories
| Category | Examples | Risk Level | Review Frequency |
|---|---|---|---|
| Domain Admins | Enterprise Admin, Domain Admin, Schema Admin | Critical | Monthly |
| Service Accounts | SQL service, backup agents, monitoring agents | High | Quarterly |
| Cloud IAM | AWS root, Azure Global Admin, GCP Owner | Critical | Monthly |
| Database Admin | DBA accounts, sa/sys accounts | High | Quarterly |
| Application Admin | App admin roles, API keys with admin scope | Medium | Semi-annually |
| Emergency/Break-glass | Firecall accounts, emergency access | Critical | After each use |
Four-Pillar Review Framework
DISCOVER VALIDATE REMEDIATE MONITOR │ │ │ │ ├─ Enumerate all ├─ Verify business ├─ Remove excess ├─ Continuous │ privileged accounts │ justification │ privileges │ monitoring │ │ │ │ ├─ Identify orphaned ├─ Confirm account ├─ Disable orphaned ├─ Anomaly │ accounts │ ownership │ accounts │ detection │ │ │ │ ├─ Map permissions to ├─ Check compliance ├─ Enforce password ├─ Session │ business roles │ with policies │ rotation │ recording │ │ │ │ └─ Classify by risk └─ Review last usage └─ Implement JIT └─ Audit level and activity access logging
Workflow
Step 1: Account Discovery and Inventory
Enumerate all privileged accounts across the environment:
Active Directory:
- Domain Admins, Enterprise Admins, Schema Admins groups
- Accounts with AdminCount=1 attribute
- Service accounts with SPN (Service Principal Names)
- Accounts with delegation rights (Unconstrained/Constrained)
Cloud Platforms:
- AWS: IAM users/roles with AdministratorAccess, PowerUserAccess, or
permissionsiam:* - Azure: Global Administrator, Privileged Role Administrator, Security Administrator roles
- GCP: Owner, Editor roles at organization/project level
Databases:
- SQL Server: sysadmin, db_owner, securityadmin fixed roles
- Oracle: DBA, SYSDBA, SYSOPER privileges
- PostgreSQL: superuser, createrole, createdb attributes
Step 2: Establish Review Criteria
Each privileged account must be evaluated against:
- Business Justification: Does the user's current role require this privilege?
- Least Privilege: Can the task be performed with lower privileges?
- Account Activity: Has the account been active in the last 90 days?
- Compliance Status: Does the account meet password policy, MFA requirements?
- Separation of Duties: Does the access create SoD conflicts?
- Ownership: Is a responsible owner assigned and active?
Step 3: Conduct the Review
For each account, the designated reviewer must:
- Review the account details, permissions, and last activity date
- Approve (certify) the access if still required with documented justification
- Revoke access if no longer needed or the reviewer cannot justify the privilege
- Flag for investigation if anomalous activity or policy violations are detected
- Escalate if the reviewer cannot make a determination
Decision matrix:
| Condition | Action |
|---|---|
| Active user, justified privilege | Certify - maintain access |
| Active user, excessive privilege | Remediate - reduce to least privilege |
| Inactive > 90 days | Disable account, notify owner |
| No owner identified | Disable account, escalate to security |
| SoD conflict detected | Remediate - reassign or add compensating controls |
| Break-glass account | Verify last use was authorized, reset credentials |
Step 4: Remediation and Enforcement
After reviews are completed:
- Revoke access for accounts that were not certified within the SLA period
- Implement automatic revocation for accounts not reviewed within 14 days
- Rotate credentials for all certified privileged accounts
- Convert standing privileges to just-in-time (JIT) access where possible
- Update PAM vault with current account inventory
Step 5: Reporting and Documentation
Generate review reports including:
- Total accounts reviewed vs. total in scope
- Certification rate (approved vs. revoked)
- Average review completion time
- Overdue reviews and escalations
- Remediation actions taken
- Comparison with previous review cycle
Validation Checklist
- Complete inventory of all privileged accounts documented
- All accounts assigned to a responsible owner/reviewer
- Review criteria and decision matrix defined
- Reviewers completed certification within SLA (14 days)
- Revoked accounts disabled and credentials rotated
- Orphaned accounts identified and disabled
- Service accounts reviewed for least privilege
- Break-glass accounts audited for authorized use only
- Review report generated with metrics and trends
- Remediation tickets created and tracked to completion
- Evidence preserved for compliance audit