Published
February 17, 2026
About the Author
Kelli Tarala
Principal Consultant ‑ GRC
A Principal Consultant with 20+ years of experience specializing in governance, risk management and compliance (GRC) strategy and implementation in cyber security, privacy, and artificial intelligence.
Keeping Credentials Secure Before They Are Exploited: Why CIS Control #12 Matters to Business Leaders
Credentials are the keys to the kingdom. They provide access to systems, applications, and data that power critical business operations. CIS Critical Security Control #12, Account Management, focuses on the creation, management, and protection of credentials to prevent unauthorized access and limit the business impact of credential compromise.
For executives, this control is not a technical detail. It is a strategic risk management lever that directly influences operational continuity, regulatory compliance, and enterprise resilience.
Credential Compromise Drives Most Breaches
Studies consistently show that stolen or misused credentials are involved in the majority of cyber incidents. Attackers leverage phishing, password reuse, credential stuffing, and insider access to gain entry. Once inside, attackers exploit excessive privileges, lateral movement, and weakly managed accounts to escalate impact.
CIS Control #12 addresses this by implementing centralized account management practices, strong authentication, and privilege oversight. For business leaders, this reduces the likelihood that a single compromised credential becomes a material business disruption.
Least Privilege Reduces Exposure
Not all accounts require the same level of access. Excessive privileges are a common enabler of breaches, turning minor incidents into enterprise-wide failures.
Control #12 enforces the principle of least privilege: users, service accounts, and administrators receive only the access they need to perform their roles. From an executive standpoint, this control constrains risk while preserving operational efficiency, ensuring that compromise cannot easily cascade.
Multi-Factor Authentication as a Strategic Lever
Passwords alone are no longer sufficient to protect critical assets. Multi-factor authentication (MFA) provides an additional barrier, making it significantly harder for attackers to misuse stolen credentials.
Implementing MFA across high-value accounts and sensitive systems is a direct business protection measure. It reduces downtime, safeguards customer data, and protects intellectual property, translating to measurable risk reduction at the enterprise level.
Onboarding, Offboarding, and Lifecycle Management
Employee turnover, contractor engagement, and role changes are constant in modern organizations. Improper account lifecycle management creates lingering access that attackers can exploit.
CIS Control #12 emphasizes timely provisioning and deprovisioning of accounts, regular review of privileges, and documented approval processes. For leaders, this control ensures that access aligns with current roles and responsibilities, reducing exposure from forgotten or inactive accounts.
Regulatory and Compliance Implications
Many regulatory frameworks explicitly require secure account management. HIPAA, PCI DSS, GDPR, and SOX all expect organizations to control access to sensitive data and systems. Failure to manage credentials appropriately can result in fines, penalties, and reputational damage.
Aligning with Control #12 demonstrates that the organization is actively managing access, which strengthens the executive team’s position during audits, inquiries, and cyber insurance reviews.
Operational Resilience Through Governance
Credential management is not just a security concern; it directly affects operational continuity. Compromised accounts can halt business processes, disrupt customer interactions, and impede strategic initiatives.
By centralizing account management, enforcing strong authentication, and conducting regular privilege reviews, executives ensure that business operations are resilient against attacks that exploit human or technical error.
Metrics that Drive Executive Oversight
Control #12 enables meaningful metrics for leadership, including:
Percentage of accounts with MFA enabled
Number of accounts reviewed and updated for role alignment
Incidents involving privileged account misuse
These metrics provide a clear view of exposure, effectiveness of controls, and areas for improvement. They turn credential management from a technical task into a strategic oversight function
Credentials as a Leadership Responsibility
Credentials represent not just access, but trust. CIS Control #12 frames this responsibility in a way that executives can govern and defend. Implementing robust account management practices is about more than compliance; it is about maintaining confidence that enterprise access is controlled, auditable, and resilient.
For business leaders, adopting CIS Control #12 is a proactive step to prevent unauthorized access, limit operational impact, and maintain stakeholder trust. By securing credentials before they are exploited, organizations harden their most critical digital assets and create a foundation for safe, scalable growth.
Related Blogs

Kelli Tarala
5
min read
CIS Control 11: Data Recovery & Business Resilience
Learn how CIS Critical Security Control 11 strengthens data recovery, ensuring business continuity, resilience, and rapid restoration after incidents.

Kelli Tarala
6
min read
CIS Control 10 Hardening the Business at Scale
Discover CIS Control 10 strategies to secure data recovery, ensure backups are protected, and strengthen resilience against ransomware and system failures.

Kelli Tarala
6
min read
CIS Control 9 for Email and Web Browser Security
Learn CIS Control 9 best practices to secure email and web browsers, block phishing, and reduce malware risks for stronger cyber defense.







