CMMC Level 2 Practice 3.1.7: Prevent non-privileged users from executing privileged functions and capture the execution of

To meet cmmc level 2 practice 3.1.7: prevent non-privileged users from executing privileged functions and capture the execution of requirement, you must (1) technically block standard users from running admin-level actions and (2) log every privileged action with enough detail to prove who did what, when, where, and how. Implement role-based access, privileged access workflows, and centralized audit logging with regular review. 1

Key takeaways:

  • Block privileged functions at the system control layer (RBAC, sudo/UAC, cloud IAM), not by policy alone. 1
  • Define “privileged function” by platform and capture execution logs centrally with identity, action, target, and outcome. 1
  • Package evidence so an assessor can trace a privileged action from authorization to execution to log retention. 2

Practice 3.1.7 is an access control requirement mapped from CMMC Level 2 to NIST SP 800-171 Rev. 2. It has two operator jobs: prevent non-privileged users from executing privileged functions, and capture the execution of those functions so you can prove control operation during assessment. 1

In a CMMC scope discussion, this requirement touches almost everything that can “do admin things”: endpoints, servers, network devices, hypervisors, cloud control planes, identity providers, databases, and security tools. If a standard user can install software, change security settings, create accounts, modify logs, disable EDR, change firewall rules, or grant permissions, you have a 3.1.7 exposure. If those actions occur but you cannot produce logs that show the actor and action details, you have the second half of the exposure. 1

Assessors typically look for two characteristics: (1) technical enforcement (not just “users are told not to”), and (2) consistent logging that is centrally retained and reviewable. Your fastest path is to treat 3.1.7 like a small program: define privileged functions, define who may execute them, enforce it in IAM and OS controls, and standardize logging and evidence. 3

Regulatory text

Requirement (excerpt): “CMMC Level 2 practice mapped to NIST SP 800-171 Rev. 2 requirement 3.1.7 (Prevent non-privileged users from executing privileged functions and capture the execution of).” 1

What the operator must do:

  1. Prevent execution: Configure systems so non-privileged (standard) users cannot run privileged functions. This must be enforced by access control mechanisms (OS, application, database, network device, or cloud platform permissions). 1
  2. Capture execution: Configure audit logging to record privileged function execution events with enough context to support accountability and investigation. Store those logs in a place where they are protected from tampering and can be produced during assessment. 1

Plain-English interpretation

“Privileged functions” are actions that change security posture, change access, change system configuration, or bypass controls. 3.1.7 requires you to ensure standard users can’t do those actions, and that every time someone with privilege does them, you have a reliable record.

A simple test: pick a standard user account. Can it install software, stop security agents, add local admins, change audit settings, create new IAM users, alter firewall rules, or modify production configuration? If yes, your prevention controls are weak. Then pick an admin action that actually happened recently. Can you show a log entry that ties the action back to a named identity and device, with timestamp and outcome? If no, your capture controls are weak. 1


Who it applies to (entity and operational context)

Entities: Defense contractors and other federal contractors handling CUI that must meet CMMC Level 2. 2

Operational scope: Any system component in the CMMC assessment boundary where privileged actions can occur, including:

  • Identity systems (AD/Azure AD/Entra ID, Okta), MFA, and PAM tooling
  • Endpoints and servers (Windows/macOS/Linux), including build servers and admin jump hosts
  • Network/security infrastructure (firewalls, switches, VPN, EDR consoles)
  • Cloud management planes (AWS/GCP/Azure IAM, resource policies, logging configuration) 1

What you actually need to do (step-by-step)

Step 1: Write the “3.1.7 control card” (make ownership and scope explicit)

Create a one-page runbook that includes:

  • Control objective: Block privileged functions for non-privileged users; log privileged function execution.
  • Owner: Name the accountable role (often IAM lead + Security Operations).
  • In-scope platforms: OS, IAM, cloud, network devices, key business apps.
  • Exception rules: Break-glass, emergency change process, and approval requirements. 2

This is operational glue. Without it, you end up with scattered configs and no evidence narrative.

Step 2: Define “privileged functions” for your environment

Create a practical list by platform. Example categories (adapt, don’t over-theorize):

  • Identity & access: create/disable accounts, reset MFA, grant roles, modify group membership
  • System security: change audit policy, disable EDR, modify firewall rules, change encryption settings
  • Configuration & software: install/uninstall software, change system services, modify registry/system files
  • Data plane admin: database admin actions, storage bucket policy changes, key management changes 1

Output artifact: a “Privileged Function Register” that maps each function category to the system where it’s enforced and logged.

Step 3: Enforce least privilege with technical controls (prevention)

Implement prevention by control layer:

Endpoints/servers

  • Remove local admin rights from standard users; use separate admin accounts for admin work.
  • Require elevation for admin tasks (UAC/sudo) and restrict who can elevate.
  • Block “admin by application” patterns (apps that run as admin for all users). 1

Identity platforms

  • Use role-based access control (RBAC).
  • Restrict role assignment (only a limited set of admins can grant admin roles).
  • Protect privileged groups with tighter approval and monitoring. 1

Cloud

  • Enforce IAM roles with least privilege; restrict policy changes to a small admin set.
  • Separate duties: deploy roles vs approve roles; production admin vs developer. 1

Step 4: Implement privileged access workflows (how admins work day to day)

Prevention fails when teams share admin credentials or “temporarily” grant admin rights and forget to remove them. Put a workflow in place:

  • Use named admin accounts (no shared admins).
  • Require MFA for privileged sessions where your platform supports it.
  • Use just-in-time elevation or time-bound group membership where feasible.
  • Maintain break-glass accounts with strict storage and documented use criteria. 1

Step 5: Capture execution with centralized audit logging (capture)

Decide what “capture” means in practice: logs must identify the actor and the action, and you must be able to produce them.

Minimum logging fields to target:

  • Actor identity (user/service account), source host, and authentication context
  • Privileged action performed (command/API call/config change)
  • Target object (host, policy, group, database, resource)
  • Timestamp and outcome (success/failure) 1

Implementation moves:

  • Turn on OS audit logs for privileged commands and group membership changes.
  • Enable admin activity logs in your IAM and cloud platforms.
  • Forward logs to a central repository (SIEM or log platform) with access controls to prevent tampering. 1

Step 6: Define review and response (prove it operates)

Auditors will ask how you know the control is working.

  • Create a recurring “privileged activity review” task owned by Security or IAM.
  • Track findings as tickets through closure (misconfigured permissions, suspicious admin actions, missing logs). 2

Daydream can help here by turning 3.1.7 into an assignable control card with an evidence checklist and recurring health checks, so you do not rebuild the same audit binder every cycle. 2


Required evidence and artifacts to retain

Keep evidence that proves both prevention and capture:

Design/administrative artifacts

  • Access control policy and standards addressing privileged access (scoped to CUI systems) 1
  • Privileged Function Register (what functions are privileged, by system)
  • Role/Group definitions for privileged roles and membership rules

Configuration evidence (screenshots/exports)

  • OS configuration showing standard users are not local admins; sudoers/UAC policies
  • IAM role assignments and restricted admin roles
  • Cloud audit logging settings enabled for admin actions 1

Operational evidence

  • Sample log extracts showing privileged function execution (with actor/action/target/outcome)
  • Tickets/approvals for time-bound elevation or admin role changes
  • Review records: sign-offs, findings, remediation tickets and closure proof 2

Retention location

  • A controlled evidence repository with access controls and clear naming conventions aligned to 3.1.7. 2

Common exam/audit questions and hangups

Expect these, and prepare your answers with evidence pointers:

  1. “Define privileged function for your environment.” Assessors want your list, not a generic definition. Bring the Privileged Function Register. 1
  2. “Show me a standard user account cannot do X.” Have a test account and a scripted demonstration for a few key actions (install software, modify security settings, change IAM roles). 1
  3. “Show me logs for an admin change.” Be ready to pull an example from SIEM for a recent privileged action and explain the fields. 1
  4. “Who can grant privilege, and how is that controlled?” Show RBAC, approvals, and tickets. 1
  5. “Can admins erase or modify the logs?” Demonstrate separation of duties and restricted access to logging systems. 1

Frequent implementation mistakes and how to avoid them

  • Mistake: Relying on policy (“users must not…”) without technical enforcement. Fix: remove local admin, enforce RBAC, require elevation. 1
  • Mistake: Shared admin accounts. Fix: named admin accounts and documented break-glass only. 1
  • Mistake: Logging is on, but not centralized or searchable. Fix: forward logs to a central platform and test retrieval during a tabletop. 1
  • Mistake: Privileged actions in SaaS/cloud are missed. Fix: include cloud control plane and SaaS admin logs in scope, not just Windows event logs. 1
  • Mistake: No operational cadence. Fix: assign an owner, define trigger events (new system, new admin, new role), and run control health checks. 2

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement. The practical risk is straightforward: if standard users can perform privileged actions, they can disable controls or expand access. If privileged actions are not logged, you lose traceability during incident response and cannot support an assessor’s determination that the practice is met. CMMC Level 2 assessments are performed against the CMMC program structure described in 32 CFR Part 170 and DoD program guidance. 2 3


A practical 30/60/90-day execution plan

First 30 days (stabilize scope and stop obvious gaps)

  • Assign an owner and publish the 3.1.7 control card (objective, systems, evidence, exceptions). 2
  • Inventory privileged roles and groups across IAM, endpoints, servers, and cloud control planes. 1
  • Remove local admin from standard user populations where feasible; identify required exceptions. 1
  • Turn on and validate logging for key privileged events in at least one representative system per platform category. 1

Next 60 days (standardize enforcement and logging)

  • Publish the Privileged Function Register and map each function to an enforcing control and log source. 1
  • Implement a privileged access workflow (request/approve/time-bound access) for admin role grants. 1
  • Centralize logs, restrict access to log storage, and test log retrieval for privileged events. 1

Next 90 days (prove sustained operation)

  • Run a control health check: sample systems, verify standard users cannot execute privileged functions, and verify logs are captured. Track remediation to closure. 2
  • Establish recurring reviews of privileged group membership and privileged activity logs with documented sign-off. 1
  • Build your assessment-ready evidence bundle in one place (policy, configs, logs, tickets, review records). 2

Frequently Asked Questions

What counts as a “privileged function” for 3.1.7?

Treat any action that changes security posture, access, or system configuration as privileged. Document your list by platform (OS, IAM, cloud, network) and map each item to how you prevent and log it. 1

Do we need a PAM tool to satisfy 3.1.7?

A dedicated PAM tool can help, but the requirement is satisfied by effective technical enforcement and logging. If you can enforce least privilege and reliably capture privileged execution across in-scope systems, you can meet the intent without a specific product. 1

How do we show “capture the execution” during an assessment?

Provide log samples for real privileged events (role assignment, policy change, software install) that include actor, action, target, timestamp, and outcome, plus evidence that logs are centrally retained and protected. 1

Are service accounts covered?

Yes. Service accounts can execute privileged functions via APIs, scripts, and automation, so they need least-privilege permissions and logging of their privileged actions. 1

What about emergency admin access (break-glass)?

Allow it, but control it with strict criteria, restricted credential storage, and after-action logging and review. Keep tickets or incident records that explain why the account was used and what actions were taken. 1

What evidence fails most often for 3.1.7?

Teams often have partial logs or logs that cannot be correlated to a person or system. Fix this by testing log retrieval for specific privileged events and documenting the query, result, and retention location in your evidence bundle. 2

Footnotes

  1. NIST SP 800-171 Rev. 2

  2. 32 CFR Part 170

  3. DoD CMMC Program Guidance

Frequently Asked Questions

What counts as a “privileged function” for 3.1.7?

Treat any action that changes security posture, access, or system configuration as privileged. Document your list by platform (OS, IAM, cloud, network) and map each item to how you prevent and log it. (Source: NIST SP 800-171 Rev. 2)

Do we need a PAM tool to satisfy 3.1.7?

A dedicated PAM tool can help, but the requirement is satisfied by effective technical enforcement and logging. If you can enforce least privilege and reliably capture privileged execution across in-scope systems, you can meet the intent without a specific product. (Source: NIST SP 800-171 Rev. 2)

How do we show “capture the execution” during an assessment?

Provide log samples for real privileged events (role assignment, policy change, software install) that include actor, action, target, timestamp, and outcome, plus evidence that logs are centrally retained and protected. (Source: NIST SP 800-171 Rev. 2)

Are service accounts covered?

Yes. Service accounts can execute privileged functions via APIs, scripts, and automation, so they need least-privilege permissions and logging of their privileged actions. (Source: NIST SP 800-171 Rev. 2)

What about emergency admin access (break-glass)?

Allow it, but control it with strict criteria, restricted credential storage, and after-action logging and review. Keep tickets or incident records that explain why the account was used and what actions were taken. (Source: NIST SP 800-171 Rev. 2)

What evidence fails most often for 3.1.7?

Teams often have partial logs or logs that cannot be correlated to a person or system. Fix this by testing log retrieval for specific privileged events and documenting the query, result, and retention location in your evidence bundle. (Source: 32 CFR Part 170)

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream