🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.3

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.3

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.3 – Separate user functionality from system management functionality.

Understanding the Requirement

This control requires your organization to identify and separate normal user functions from system management (administrative) functions so that people who do not have administrative responsibilities cannot perform system administration, and administrators perform administrative tasks only when using a distinct administrative account. In practice that means listing which accounts and roles perform user vs. admin tasks, ensuring administrators have two accounts (a regular user account and an admin account), and technically restricting admin functions to the admin accounts and appropriate management systems.

Technical Implementation

  • Inventory and justify administrative accounts.

    Start with an access review: produce a list of accounts with local or domain administrative privileges (Active Directory Domain Admins, local administrators on servers/workstations, network device admins). For each account document the business need, approver, and frequency of use. Remove or suspend any admin accounts that cannot be justified.

  • Create and enforce dual-account practice for admins.

    Require administrators to have two accounts: a daily-use unprivileged user account and a separate admin account used only for system management tasks. Enforce this by local policy, Active Directory group membership, and work procedures; disable admin account interactive login on end-user workstations where possible.

  • Use group-based and role-based controls to restrict admin access.

    Implement security groups for administrative roles (e.g., Domain Admins, Server Admins, Network Admins) and apply Least Privilege: grant the minimal admin rights necessary. Limit which machines these groups can log into (for example, only management servers, jump boxes, or privileged workstations).

  • Use dedicated management workstations or jump hosts.

    Deploy a hardened admin workstation (Privileged Access Workstation or jump server) for all administrative tasks. Block admin accounts from logging into ordinary user workstations to reduce credential theft risk. Where a PAM (Privileged Access Management) solution is available, use it to broker admin sessions.

  • Apply technical controls and logging.

    Enforce multi-factor authentication for admin accounts, enable audit logging for privileged actions (e.g., AD changes, server configuration changes), and forward logs to a centralized log server or SIEM. Configure alerts for administrative logins from unusual places or outside business hours.

  • Policy, training, and periodic review.

    Publish a short written policy that defines the dual-account requirement and authorized admin activities. Train admins on when to use each account and review admin access quarterly (or after personnel changes). Include consequences for failing to follow the process.

Example in a Small or Medium Business

Acme Tech, a 60-person MSP, held an access audit and found 18 accounts with elevated privileges across servers and network devices. The IT manager removed administrative rights from five contractors who no longer needed them, and then mapped the remaining admins to specific roles (AD admin, server admin, network admin). Each administrator was given a regular domain user account for email and daily tasks plus a separate admin account with a clear naming convention (e.g., jsmith-admin). The company set up a hardened jump server that only admin accounts can access and blocked admin accounts from logging into staff desktops via group policy. They required MFA for admin accounts and enabled detailed auditing of changes in Active Directory and on critical servers, with alerts emailed to the IT manager. The IT policy was updated to require quarterly access reviews and short training for new admins. A month later, an attempted change from a staff member using a regular account was denied while the same admin successfully logged in using their admin account on the jump host—demonstrating separation worked as designed.

Summary

Separating user functionality from system management functionality is achieved by a combination of policy (dual-account requirement, documented approvals, and reviews) and technical controls (group/role restrictions, jump hosts, MFA, logging). For SMBs the practical path is: inventory admin privileges, revoke unnecessary rights, provide administrators with distinct admin accounts, limit where those accounts can log on, and log and review administrative activities. These simple, repeatable steps reduce the risk of privilege misuse and make it straightforward to demonstrate compliance during an assessment.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes