Skip to content

3.1.6 — Two Hats, Two Accounts

Use non-privileged accounts or roles when accessing nonsecurity functions.

Simple rule: admins have two accounts.

Account 1: Regular user account. For email, web browsing, Teams, documents — everything that isn’t system administration.

Account 2: Admin account. Only used when performing admin tasks — configuring systems, managing accounts, changing security settings.

Why? If an admin clicks a phishing link while browsing with a domain admin account, the attacker gets domain admin. If they’re using their regular account, the attacker gets a standard user — annoying, but containable.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Are nonsecurity functions identified?You’ve defined which tasks don’t need elevated access
2Do admins use non-privileged accounts for those functions?They actually switch accounts — and you can prove it

Documents they’ll review: Access control policy, least privilege procedures, system security plan, list of security functions assigned to privileged accounts, system configuration, audit logs

People they’ll talk to: Personnel defining least privilege, security staff, sysadmins

Live demos they’ll ask for: “Show me that your admin uses a separate account for email and browsing.”


These are the actual questions. Have answers ready.

  • “Are nonsecurity functions and non-privileged roles defined?”
  • “How do you verify that admins only use privileged accounts for security functions?”
  • “Can you show me that admin accounts are separate from daily-use accounts?”

One account for everything. Admins using their privileged account to check email, browse the web, and do admin work. Most common failure.

No enforcement. Policy says use separate accounts but nothing stops the admin from using the privileged one for everything.

Shared admin accounts. Multiple people logging in as “admin” — impossible to trace actions to individuals.



RequirementWhy it matters here
3.1.5 — Minimum NecessaryThe principle behind minimum access
3.1.7 — Log the Admin WorkLogs when admin functions are executed
3.3.2 — Trace Every ActionTracing actions to individuals

Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.


CMMC Practice ID: AC.L2-3.1.6 | SPRS Weight: 1 point | POA&M Eligible: Yes