FedRAMP AI Studio

Automated SSP Narrative Generation
← Back to Dashboard

Generated Narrative: AC-2 DRAFT

Account: 154776478584 Model: gpt-4o Valid Structure
Narrative saved. ID: 17f04fe8-eaf9-4455-9113-c56924a93a6e — Retrievable via GET /ai/narratives/17f04fe8-eaf9-4455-9113-c56924a93a6e

Control Overview

The AC-2 control, Account Management, is a critical component of the Access Control family, ensuring that account management processes are robust and aligned with FedRAMP requirements. The organization is in the planning phase for implementing this control, with a structured roadmap guiding the development and deployment of comprehensive account management mechanisms. The control is designed to manage the lifecycle of user accounts, including creation, modification, and deletion, while ensuring compliance with security policies and procedures.

Governance and Roles

The organization has established governance structures to oversee account management processes. Account managers, designated as group owners, are responsible for approving account modifications, including provisioning, deprovisioning, and modifications for FedRAMP accounts. These processes are documented and tracked through Jira, ensuring accountability and traceability. Customers are also required to assign account managers to manage accounts within their environments, with the organization providing initial account setup support.

Technical Implementation

The technical implementation of account management is planned to leverage Federal LDAP and AWS IAM for managing user accounts and access privileges. The organization has defined and documented account types, and the account provisioning process includes mandatory approvals from account managers. Access is managed via Role-Based Access Control (RBAC), ensuring that users have appropriate privileges based on their roles. Automated alerts and notifications are configured through Jira and Splunk to ensure timely updates and monitoring of account activities.

Monitoring and Review

The organization plans to implement continuous monitoring of account usage, with logs forwarded to a centralized Security Information and Event Management (SIEM) system for analysis. Account reviews are scheduled monthly for privileged access and every six months for non-privileged access, ensuring compliance with account management requirements. These reviews are coordinated by group owners in collaboration with the Infrastructure team.

Shared Responsibility

Account management is a shared responsibility between the organization and its customers. While the organization provides the infrastructure and initial account setup, customers are responsible for defining account types, managing access authorizations, and monitoring account usage within their environments. The organization supports customers by providing guidance and tools necessary for effective account management.

Inheritance

The organization partially inherits the AC-2 control from the hosting environment on AWS East/West, which is FedRAMP authorized. This inheritance includes leveraging AWS's robust account management capabilities and aligning with their security controls. The organization builds upon this foundation to implement additional account management processes specific to its operational requirements.

Continuous Improvement

The organization is committed to continuous improvement of its account management processes. Enhancements identified through periodic reviews are tracked through the Plan of Action and Milestones (POA&M) process and addressed through continuous monitoring. The roadmap for implementing AC-2 includes milestones for achieving full compliance, with target dates and progress tracked to ensure timely completion. The organization remains vigilant in adapting to emerging threats and evolving security requirements, ensuring that account management processes remain effective and secure.

Agent Trace

High-level planning + tools used (no chain-of-thought). This helps validate the narrative is evidence-driven.

Assessor Summary
Planned / Executed Tool Calls
Tool Args Result
aws_default_evidence_snapshot
{
  "account_id": "154776478584",
  "ingestion_run_id": "6e066971-b587-4844-a459-c7203e772d91",
  "sample_limit": 10
}
ok

Evidence Snapshot (Audit Trail)

The exact evidence data the AI model used to generate this narrative. Stored with every generated narrative for traceability (AU-3).

{
  "account_id": "154776478584",
  "analysis": {
    "evidence_needs": [],
    "preferred_tables": []
  },
  "control_id": "AC-2",
  "ingestion_run_id": "6e066971-b587-4844-a459-c7203e772d91",
  "tool_calls": [
    {
      "args": {
        "account_id": "154776478584",
        "ingestion_run_id": "6e066971-b587-4844-a459-c7203e772d91",
        "sample_limit": 10
      },
      "name": "aws_default_evidence_snapshot"
    }
  ],
  "tool_outputs": [
    {
      "args": {
        "account_id": "154776478584",
        "ingestion_run_id": "6e066971-b587-4844-a459-c7203e772d91",
        "sample_limit": 10
      },
      "name": "aws_default_evidence_snapshot",
      "result": {
        "counts": {
          "assets": [
            {
              "count": 3,
              "resource_type": "ebs_volume"
            },
            {
              "count": 2,
              "resource_type": "ec2_instance"
            }
          ],
          "data_stores": [],
          "identities": [
            {
              "count": 1,
              "resource_type": "iam_password_policy"
            },
            {
              "count": 4,
              "resource_type": "iam_role"
            },
            {
              "count": 5,
              "resource_type": "iam_user"
            }
          ],
          "network_components": [
            {
              "count": 1,
              "resource_type": "internet_gateway"
            },
            {
              "count": 1,
              "resource_type": "network_acl"
            },
            {
              "count": 1,
              "resource_type": "route_table"
            },
            {
              "count": 3,
              "resource_type": "security_group"
            },
            {
              "count": 6,
              "resource_type": "subnet"
            },
            {
              "count": 1,
              "resource_type": "vpc"
            }
          ]
        },
        "summaries": {
          "cloudtrail": {
            "cloudwatch_logs_integration_trails_count": 0,
            "kms_enabled_trails_count": 0,
            "log_file_validation_enabled_trails_count": 0,
            "logging_enabled_trails_count": 0,
            "multi_region_trails_count": 0,
            "sample_trails": [],
            "total_trails": 0
          },
          "cloudwatch_logs": {
            "kms_encrypted_log_groups_count": 0,
            "log_groups_with_retention_count": 0,
            "log_groups_without_retention_count": 0,
            "sample_log_groups_without_retention": [],
            "total_log_groups": 0
          },
          "cm8_inventory": {
            "counts": {
              "assets": [
                {
                  "count": 3,
                  "resource_type": "ebs_volume"
                },
                {
                  "count": 2,
                  "resource_type": "ec2_instance"
                }
              ],
              "data_stores": [],
              "identities": [
                {
                  "count": 1,
                  "resource_type": "iam_password_policy"
                },
                {
                  "count": 4,
                  "resource_type": "iam_role"
                },
                {
                  "count": 5,
                  "resource_type": "iam_user"
                }
              ],
              "network_components": [
                {
                  "count": 1,
                  "resource_type": "internet_gateway"
                },
                {
                  "count": 1,
                  "resource_type": "network_acl"
                },
                {
                  "count": 1,
                  "resource_type": "route_table"
                },
                {
                  "count": 3,
                  "resource_type": "security_group"
                },
                {
                  "count": 6,
                  "resource_type": "subnet"
                },
                {
                  "count": 1,
                  "resource_type": "vpc"
                }
              ]
            },
            "ebs_volumes": {
              "encrypted_volumes_count": 0,
              "sample_unencrypted_volumes": [
                {
                  "attachments": [
                    {
                      "attach_time": "2022-09-10 19:16:37+00:00",
                      "delete_on_termination": true,
                      "device": "/dev/sda1",
                      "instance_id": "i-0322a28bf1a8a68c5",
                      "state": "attached"
                    }
                  ],
                  "region": "us-east-1",
                  "size_gb": 10,
                  "volume_id": "vol-0402ca2f2f3be9e94"
                },
                {
                  "attachments": [
                    {
                      "attach_time": "2022-08-28 20:05:24+00:00",
                      "delete_on_termination": true,
                      "device": "/dev/sdb",
                      "instance_id": "i-0601780d500bb51ea",
                      "state": "attached"
                    }
                  ],
                  "region": "us-east-1",
                  "size_gb": 10,
                  "volume_id": "vol-017cf162462cc1786"
                },
                {
                  "attachments": [
                    {
                      "attach_time": "2022-08-28 20:05:24+00:00",
                      "delete_on_termination": true,
                      "device": "/dev/sda1",
                      "instance_id": "i-0601780d500bb51ea",
                      "state": "attached"
                    }
                  ],
                  "region": "us-east-1",
                  "size_gb": 20,
                  "volume_id": "vol-05e6fd7a0bd29300e"
                }
              ],
              "total_volumes": 3,
              "unencrypted_volumes_count": 3
            }
          },
          "ec2_instances": {
            "monitoring_enabled_count": 0,
            "sample_instances": [
              {
                "iam_instance_profile": null,
                "instance_id": "i-0601780d500bb51ea",
                "instance_type": "t2.medium",
                "monitoring_enabled": false,
                "region": "us-east-1",
                "security_group_ids": [
                  "sg-090ff45d5d6ad1cd4"
                ],
                "state": "stopped",
                "subnet_id": "subnet-0b8c568bc3659b486",
                "tags": {
                  "Name": "First Instance"
                },
                "vpc_id": "vpc-033668c99bb7641b0"
              },
              {
                "iam_instance_profile": null,
                "instance_id": "i-0322a28bf1a8a68c5",
                "instance_type": "t2.micro",
                "monitoring_enabled": false,
                "region": "us-east-1",
                "security_group_ids": [
                  "sg-090ff45d5d6ad1cd4"
                ],
                "state": "stopped",
                "subnet_id": "subnet-05c9a438bb7c68867",
                "tags": {
                  "Name": "Second Instance"
                },
                "vpc_id": "vpc-033668c99bb7641b0"
              }
            ],
            "states": {
              "stopped": 2
            },
            "total_instances": 2
          },
          "iam_authentication_posture": {
            "credential_report": null,
            "password_policy": {
              "exists": false
            }
          },
          "iam_policy_attachments": {
            "roles_total": 4,
            "roles_with_attached_policies_count": 4,
            "roles_with_inline_policies_count": 0,
            "sample_roles": [
              {
                "arn": "arn:aws:iam::154776478584:role/Audit",
                "attached_policies": [
                  "arn:aws:iam::aws:policy/SecurityAudit"
                ],
                "inline_policy_names": [],
                "max_session_duration": 3600,
                "role_name": "Audit"
              },
              {
                "arn": "arn:aws:iam::154776478584:role/aws-service-role/resource-explorer-2.amazonaws.com/AWSServiceRoleForResourceExplorer",
                "attached_policies": [
                  "arn:aws:iam::aws:policy/aws-service-role/AWSResourceExplorerServiceRolePolicy"
                ],
                "inline_policy_names": [],
                "max_session_duration": 3600,
                "role_name": "AWSServiceRoleForResourceExplorer"
              },
              {
                "arn": "arn:aws:iam::154776478584:role/aws-service-role/support.amazonaws.com/AWSServiceRoleForSupport",
                "attached_policies": [
                  "arn:aws:iam::aws:policy/aws-service-role/AWSSupportServiceRolePolicy"
                ],
                "inline_policy_names": [],
                "max_session_duration": 3600,
                "role_name": "AWSServiceRoleForSupport"
              },
              {
                "arn": "arn:aws:iam::154776478584:role/aws-service-role/trustedadvisor.amazonaws.com/AWSServiceRoleForTrustedAdvisor",
                "attached_policies": [
                  "arn:aws:iam::aws:policy/aws-service-role/AWSTrustedAdvisorServiceRolePolicy"
                ],
                "inline_policy_names": [],
                "max_session_duration": 3600,
                "role_name": "AWSServiceRoleForTrustedAdvisor"
              }
            ],
            "sample_users": [
              {
                "arn": "arn:aws:iam::154776478584:user/AbdulHadi",
                "attached_policies": [],
                "groups": [],
                "inline_policy_names": [],
                "user_name": "AbdulHadi"
              },
              {
                "arn": "arn:aws:iam::154776478584:user/farhan",
                "attached_policies": [
                  "arn:aws:iam::aws:policy/AdministratorAccess",
                  "arn:aws:iam::aws:policy/IAMUserChangePassword"
                ],
                "groups": [
                  "AdminGroup"
                ],
                "inline_policy_names": [],
                "user_name": "farhan"
              },
              {
                "arn": "arn:aws:iam::154776478584:user/hamza",
                "attached_policies": [
                  "arn:aws:iam::aws:policy/AdministratorAccess",
                  "arn:aws:iam::aws:policy/IAMUserChangePassword"
                ],
                "groups": [
                  "AdminGroup"
                ],
                "inline_policy_names": [],
                "user_name": "hamza"
              },
              {
                "arn": "arn:aws:iam::154776478584:user/salman",
                "attached_policies": [
                  "arn:aws:iam::aws:policy/AdministratorAccess",
                  "arn:aws:iam::aws:policy/IAMUserChangePassword"
                ],
                "groups": [
                  "AdminGroup"
                ],
                "inline_policy_names": [],
                "user_name": "salman"
              },
              {
                "arn": "arn:aws:iam::154776478584:user/shevyn",
                "attached_policies": [
                  "arn:aws:iam::aws:policy/AdministratorAccess",
                  "arn:aws:iam::aws:policy/IAMUserChangePassword",
                  "arn:aws:iam::aws:policy/AWSBillingConductorFullAccess"
                ],
                "groups": [
                  "AdminGroup"
                ],
                "inline_policy_names": [],
                "user_name": "shevyn"
              }
            ],
            "top_attached_policies": [
              {
                "count": 4,
                "policy_arn": "arn:aws:iam::aws:policy/AdministratorAccess"
              },
              {
                "count": 4,
                "policy_arn": "arn:aws:iam::aws:policy/IAMUserChangePassword"
              },
              {
                "count": 1,
                "policy_arn": "arn:aws:iam::aws:policy/AWSBillingConductorFullAccess"
              },
              {
                "count": 1,
                "policy_arn": "arn:aws:iam::aws:policy/SecurityAudit"
              },
              {
                "count": 1,
                "policy_arn": "arn:aws:iam::aws:policy/aws-service-role/AWSResourceExplorerServiceRolePolicy"
              },
              {
                "count": 1,
                "policy_arn": "arn:aws:iam::aws:policy/aws-service-role/AWSSupportServiceRolePolicy"
              },
              {
                "count": 1,
                "policy_arn": "arn:aws:iam::aws:policy/aws-service-role/AWSTrustedAdvisorServiceRolePolicy"
              }
            ],
            "top_inline_policy_names": [],
            "users_total": 5,
            "users_with_attached_policies_count": 4,
            "users_with_inline_policies_count": 0
          },
          "iam_users": {
            "active_access_keys_count": 2,
            "mfa_disabled_count": 5,
            "mfa_enabled_count": 0,
            "sample_users": [
              {
                "access_keys_count": 1,
                "arn": "arn:aws:iam::154776478584:user/AbdulHadi",
                "groups": [],
                "mfa_enabled": false,
                "password_last_used": "None",
                "user_name": "AbdulHadi"
              },
              {
                "access_keys_count": 0,
                "arn": "arn:aws:iam::154776478584:user/farhan",
                "groups": [
                  "AdminGroup"
                ],
                "mfa_enabled": false,
                "password_last_used": "2025-12-11T17:46:35Z",
                "user_name": "farhan"
              },
              {
                "access_keys_count": 1,
                "arn": "arn:aws:iam::154776478584:user/hamza",
                "groups": [
                  "AdminGroup"
                ],
                "mfa_enabled": false,
                "password_last_used": "2026-03-04T23:03:00Z",
                "user_name": "hamza"
              },
              {
                "access_keys_count": 0,
                "arn": "arn:aws:iam::154776478584:user/salman",
                "groups": [
                  "AdminGroup"
                ],
                "mfa_enabled": false,
                "password_last_used": "2026-02-06T23:13:07Z",
                "user_name": "salman"
              },
              {
                "access_keys_count": 0,
                "arn": "arn:aws:iam::154776478584:user/shevyn",
                "groups": [
                  "AdminGroup"
                ],
                "mfa_enabled": false,
                "password_last_used": "2026-02-06T14:39:51Z",
                "user_name": "shevyn"
              }
            ],
            "total_users": 5
          },
          "network_boundary": {
            "counts_by_resource_type": {
              "internet_gateway": 1,
              "network_acl": 1,
              "route_table": 1,
              "security_group": 3,
              "subnet": 6,
              "vpc": 1
            },
            "sample": {
              "internet_gateway": [
                {
                  "id": "igw-0c2d9b6f737cc026e",
                  "region": "us-east-1",
                  "summary": {
                    "attachments": [
                      {
                        "State": "available",
                        "VpcId": "vpc-033668c99bb7641b0"
                      }
                    ],
                    "internet_gateway_id": "igw-0c2d9b6f737cc026e",
                    "tags": {}
                  },
                  "vpc_id": "vpc-033668c99bb7641b0"
                }
              ],
              "nat_gateway": [],
              "network_acl": [
                {
                  "id": "acl-06660319533dddb32",
                  "region": "us-east-1",
                  "summary": {
                    "associations": [
                      {
                        "network_acl_association_id": "aclassoc-0c29b39b3fcdfb473",
                        "subnet_id": "subnet-006336d9696975386"
                      },
                      {
                        "network_acl_association_id": "aclassoc-0618ec8477cd3a5d2",
                        "subnet_id": "subnet-0b8c568bc3659b486"
                      },
                      {
                        "network_acl_association_id": "aclassoc-02f93f4972febca91",
                        "subnet_id": "subnet-0c567848e2f3285b9"
                      },
                      {
                        "network_acl_association_id": "aclassoc-0dcb08e13e94dc611",
                        "subnet_id": "subnet-05c9a438bb7c68867"
                      },
                      {
                        "network_acl_association_id": "aclassoc-0b2e9a777557a332d",
                        "subnet_id": "subnet-0b3e792cb9abb6b15"
                      },
                      {
                        "network_acl_association_id": "aclassoc-01cbb62a80cdc5353",
                        "subnet_id": "subnet-06c23e873cdba6e94"
                      }
                    ],
                    "entries": [
                      {
                        "cidr_block": "0.0.0.0/0",
                        "egress": true,
                        "ipv6_cidr_block": null,
                        "port_range": null,
                        "protocol": "-1",
                        "rule_action": "allow",
                        "rule_number": 100
                      },
                      {
                        "cidr_block": "0.0.0.0/0",
                        "egress": true,
                        "ipv6_cidr_block": null,
                        "port_range": null,
                        "protocol": "-1",
                        "rule_action": "deny",
                        "rule_number": 32767
                      },
                      {
                        "cidr_block": "0.0.0.0/0",
                        "egress": false,
                        "ipv6_cidr_block": null,
                        "port_range": null,
                        "protocol": "-1",
                        "rule_action": "allow",
                        "rule_number": 100
                      },
                      {
                        "cidr_block": "0.0.0.0/0",
                        "egress": false,
                        "ipv6_cidr_block": null,
                        "port_range": null,
                        "protocol": "-1",
                        "rule_action": "deny",
                        "rule_number": 32767
                      }
                    ],
                    "is_default": true,
                    "network_acl_id": "acl-06660319533dddb32",
                    "tags": {},
                    "vpc_id": "vpc-033668c99bb7641b0"
                  },
                  "vpc_id": "vpc-033668c99bb7641b0"
                }
              ],
              "route_table": [
                {
                  "id": "rtb-0e286a42d0f5851da",
                  "region": "us-east-1",
                  "summary": {
                    "associations": [
                      {
                        "association_id": "rtbassoc-04fbdfbd5f3d513a8",
                        "gateway_id": null,
                        "main": true,
                        "subnet_id": null
                      }
                    ],
                    "route_table_id": "rtb-0e286a42d0f5851da",
                    "routes": [
                      {
                        "destination_cidr_block": "172.31.0.0/16",
                        "destination_ipv6_cidr_block": null,
                        "gateway_id": "local",
                        "instance_id": null,
                        "nat_gateway_id": null,
                        "origin": "CreateRouteTable",
                        "state": "active",
                        "transit_gateway_id": null,
                        "vpc_peering_connection_id": null
                      },
                      {
                        "destination_cidr_block": "0.0.0.0/0",
                        "destination_ipv6_cidr_block": null,
                        "gateway_id": "igw-0c2d9b6f737cc026e",
                        "instance_id": null,
                        "nat_gateway_id": null,
                        "origin": "CreateRoute",
                        "state": "active",
                        "transit_gateway_id": null,
                        "vpc_peering_connection_id": null
                      }
                    ],
                    "tags": {},
                    "vpc_id": "vpc-033668c99bb7641b0"
                  },
                  "vpc_id": "vpc-033668c99bb7641b0"
                }
              ],
              "vpc_endpoint": []
            }
          },
          "rds_instances": {
            "encrypted_rds_instances_count": 0,
            "publicly_accessible_rds_instances_count": 0,
            "sample_unencrypted_rds_instances": [],
            "total_rds_instances": 0,
            "unencrypted_rds_instances_count": 0
          },
          "s3_buckets": {
            "encrypted_buckets_count": 0,
            "public_access_block_missing_count": 0,
            "sample_unencrypted_buckets": [],
            "total_buckets": 0,
            "unencrypted_buckets_count": 0
          },
          "security_groups": {
            "sample_world_open_security_groups": [
              {
                "group_id": "sg-090ff45d5d6ad1cd4",
                "group_name": "launch-wizard-1",
                "open_ingress_rules": [
                  {
                    "cidr_blocks": [
                      "0.0.0.0/0"
                    ],
                    "description": null,
                    "from_port": 22,
                    "ipv6_cidr_blocks": [],
                    "protocol": "tcp",
                    "to_port": 22
                  }
                ],
                "vpc_id": "vpc-033668c99bb7641b0"
              },
              {
                "group_id": "sg-00b9a1b8acdc7534e",
                "group_name": "launch-wizard-2",
                "open_ingress_rules": [
                  {
                    "cidr_blocks": [
                      "0.0.0.0/0"
                    ],
                    "description": null,
                    "from_port": 3389,
                    "ipv6_cidr_blocks": [],
                    "protocol": "tcp",
                    "to_port": 3389
                  }
                ],
                "vpc_id": "vpc-033668c99bb7641b0"
              }
            ],
            "security_groups_with_world_open_ingress_count": 2,
            "total_security_groups": 3,
            "world_open_ingress_rule_count": 2
          },
          "vpc_flow_logs": {
            "deliver_logs_success_count": 0,
            "sample_flow_logs": [],
            "total_flow_logs": 0
          }
        }
      }
    }
  ],
  "tool_plan": {
    "tool_calls": [
      {
        "args": {
          "account_id": "154776478584",
          "ingestion_run_id": "6e066971-b587-4844-a459-c7203e772d91",
          "sample_limit": 10
        },
        "name": "aws_default_evidence_snapshot"
      }
    ]
  }
}