Skip to main content

NIST CSF 2.0 – Protect Function Deep Dive: Identity, Authentication, and Access Control (PR.AA)


If you strip most cyber incidents down to their root cause, you will usually find the same failure:

Someone—or something—had access they should not have had.

It might be:

  • A compromised employee account

  • An administrator with too much privilege

  • A service account that was never rotated

  • A vendor account that was never removed

Tools fail. Controls misfire. Alerts get missed.
But identity and access failures quietly bypass them all.

That is why PR.AA – Identity Management, Authentication, and Access Control is the first category in the NIST CSF 2.0 Protect function. It represents the moment where cybersecurity stops being abstract planning and starts becoming real enforcement.


How PR.AA Fits Into the Big Picture

Up to this point, the Identify function helped answer:

  • What assets exist? (ID.AM)

  • What risks matter most? (ID.RA)

  • How do we learn and improve over time? (ID.IM)

The Protect function answers the next logical question:

“Now that we know what matters—how do we stop bad things from happening?”

PR.AA is the foundation of that answer.

If Identify tells you what you need to protect,
PR.AA determines who is allowed near it.


What Is PR.AA (In Simple Terms)?

PR.AA ensures that only the right people, systems, and services can access the right things, in the right way, at the right time.

It covers three tightly related areas:

  1. Identity Management
    Knowing who or what is requesting access

  2. Authentication
    Proving that identity is legitimate

  3. Access Control
    Deciding what that identity is allowed to do

Importantly, NIST CSF 2.0 makes it clear that identity is not just people.

Identities include:

  • Employees

  • Contractors

  • Vendors

  • Administrators

  • Applications

  • APIs

  • Cloud workloads

  • Automated services

If it can log in, connect, or authenticate—it is an identity.


Why Identity Is So Critical Today

In older environments, security relied heavily on:

  • Corporate networks

  • Firewalls

  • Physical office locations

Those boundaries are gone.

Today:

  • Users work remotely

  • Applications live in the cloud

  • Data is accessed through SaaS

  • Vendors connect directly into environments

Because of this shift:

Identity has become the new perimeter.

Attackers no longer try to “break in” noisily.
They try to log in quietly.


Common PR.AA Mistakes (Especially in Growing Programs)

Understanding what not to do is just as important.

1. “We Have MFA, So We’re Good”

Multi-factor authentication is important—but it is not enough.

If a user:

  • Has excessive access

  • Retains access after changing roles

  • Keeps admin rights permanently

Then MFA only protects bad decisions more securely.


2. Treating Identity as an IT Problem

Identity is often owned by IT, but access risk belongs to the business.

Security teams enforce controls.
Business leaders decide who needs access to what.

When this line blurs, privilege creep explodes.


3. Ignoring Non-Human Accounts

Service accounts and APIs often:

  • Have broad permissions

  • Never expire

  • Are poorly monitored

These accounts are frequently involved in major breaches because they are powerful and invisible.


How to Implement PR.AA in a Clear, Practical Way

1. Start by Knowing Your Identities

At a minimum, organizations should be able to answer:

  • How many identities exist?

  • Which are human vs non-human?

  • Which identities are privileged?

  • Who owns each identity?

If an identity has no owner, it is unmanaged risk.


2. Match Authentication Strength to Risk

Not every action requires the same level of trust.

For example:

  • Reading public data ≠ administering production systems

  • Internal access ≠ remote access

  • Temporary access ≠ permanent access

Mature programs apply stronger authentication where the impact is higher, rather than everywhere equally.


3. Enforce Least Privilege as a Habit

Least privilege means:

  • Access is granted based on real business need

  • Access is removed when it’s no longer needed

  • Elevated access is temporary whenever possible

Think of access like keys:

  • You borrow them when needed

  • You return them when finished

  • You don’t keep every key “just in case”


4. Control Privileged Access Carefully

Administrator and high-risk access should:

  • Be limited to a small population

  • Require additional approval

  • Be logged and monitored

  • Expire automatically

Standing admin privileges are one of the most common and dangerous weaknesses in cybersecurity programs.


5. Make Access Decisions Understandable and Auditable

Good PR.AA programs allow anyone to answer:

  • Who approved this access?

  • Why was it granted?

  • How long is it valid?

  • When was it last reviewed?

This clarity protects both the organization and the individuals involved.


Metrics That Help Everyone Understand Progress

Metrics should explain how well access is controlled, not just which tools are deployed.

Simple, Foundational Metrics

  • % of users with MFA enabled

  • % of privileged accounts identified

  • % of identities with a documented owner

  • Time to remove access after termination

These are easy to grasp and extremely informative.


Better Risk-Focused Metrics

  • Number of standing privileged accounts

  • Average duration of elevated access

  • % of access approved by business owners

  • Privilege reductions over time

These show whether risk is actually decreasing.


What “Good” Looks Like (At Any Level)

A healthy PR.AA capability means:

  • Access is intentional, not accidental

  • Privilege is earned, justified, and temporary

  • Business owners understand their responsibility

  • Identity decisions can be explained without panic

  • Security enables work without becoming a blocker

For beginners, this creates clarity.
For new CISOs, it creates confidence and credibility.


Final Thoughts

You can invest in the best security tools available.
You can write the strongest policies.
You can design beautiful architectures.

But if identity and access are weak, attackers will simply walk around all of it.

NIST CSF 2.0 places PR.AA at the front of Protect because security starts with trust—and trust must be enforced.

If Identify tells you what matters,
Protect—starting with identity—decides who can touch it.

Popular posts from this blog

Generative AI Governance: Using the NIST Framework to Build Trust, Reduce Risk, and Lead Secure AI Adoption

Generative AI has moved faster than nearly any technology security leaders have dealt with. Tools that can generate text, code, images, and data insights are now embedded into productivity platforms, security tooling, development workflows, and business operations—often before security teams are formally involved. For CISOs, this creates a familiar but amplified challenge: innovation is happening faster than governance, and unmanaged generative AI introduces material risk across confidentiality, integrity, availability, compliance, and trust. For aspiring information security professionals, AI governance represents a growing and valuable discipline where strategic thinking matters just as much as technical depth. The good news? We don’t need to invent governance from scratch. NIST’s AI Risk Management Framework (AI RMF) provides a practical, flexible structure that security leaders can use today to govern generative AI responsibly and defensibly. Why Generative AI Governance Matt...

NIST CSF 2.0 – Identify Function Deep Dive: Asset Management (ID.AM)

If you ask most CISOs where breaches really start, the answer is rarely “lack of tools.” It’s almost always lack of clarity . You cannot protect what you do not know exists. That is why Asset Management (ID.AM) sits at the foundation of the NIST Cybersecurity Framework (CSF) 2.0 Identify function. Every control, risk decision, investment, and response capability depends on accurate, current, and business-aligned asset visibility. In NIST CSF 2.0, Asset Management is no longer treated as an inventory exercise—it is framed as a risk-enabling capability that supports governance, threat modeling, resilience, and mission outcomes. This post breaks down: What ID.AM actually is in CSF 2.0 How to implement it pragmatically in a real enterprise Metrics CISOs and boards can use to measure effectiveness (not just activity) What Is NIST CSF 2.0 Asset Management (ID.AM)? ID.AM ensures that organizational assets—physical, digital, cloud-based, third-party, and data-centric—are identified, mana...