Episode 87 — Spotlight: Separation of Duties (AC-5)

Separation of Duties (AC-5) prevents fraud, error, and unauthorized activity by dividing critical functions among different individuals or roles. On the exam, candidates should recognize that this control enforces checks and balances within processes such as system administration, financial transactions, or access provisioning. No single person should be able to initiate and approve the same action. AC-5 complements least privilege by focusing on function segregation rather than access volume. When implemented properly, it ensures accountability and reduces the likelihood of abuse through collusion or privilege misuse.
Operationally, organizations enforce separation of duties through system role design, workflow approvals, and technical restrictions. Identity governance tools flag conflicting entitlements, such as a user who can both request and approve access. Audit teams periodically review combinations of permissions against job descriptions to identify violations. Documentation maps each key function to the number of individuals required to complete it, ensuring redundancy without concentration of power. Metrics include percentage of users with conflicting roles resolved and audit findings related to segregation breaches. Avoiding pitfalls means automating conflict detection and ensuring temporary exceptions are documented, approved, and time-bound. By mastering AC-5, professionals prove they can design organizational processes that embed trust through structured accountability.
 Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 87 — Spotlight: Separation of Duties (AC-5)
Broadcast by