Verification & Testing: Control 2.8 - Access Control and Segregation of Duties
Last Updated: January 2026
Manual Verification Steps
Test 1: Verify Security Groups
- Open Entra Admin Center > Groups
- Search for "SG-Agent-"
- Verify all 5 governance groups exist
- EXPECTED: All groups present with appropriate membership
Test 2: Verify SoD Enforcement
- Attempt to add same user to SG-Agent-Developers AND SG-Agent-Approvers
- Submit an agent for approval as that user
- Attempt to approve as the same user
- EXPECTED: Approval should be blocked (SoD violation)
Test 3: Verify PIM Activation
- Sign in as user eligible for Platform Admin role
- Navigate to PIM > My roles
- Activate the Platform Admin role
- EXPECTED: Requires justification and/or approval
Test 4: Verify Access Review
- Navigate to Identity Governance > Access reviews
- Confirm quarterly review is scheduled
- Check last review completion rate
- EXPECTED: Reviews scheduled, >95% completion
Test Cases
| Test ID | Scenario | Expected Result | Pass/Fail |
|---|---|---|---|
| TC-2.8-01 | All security groups exist | 5 groups present | |
| TC-2.8-02 | Groups have correct membership | Roles properly assigned | |
| TC-2.8-03 | SoD blocks creator self-approval | Approval rejected | |
| TC-2.8-04 | PIM requires justification | Activation requires reason | |
| TC-2.8-05 | Access review scheduled | Quarterly cadence set | |
| TC-2.8-06 | No user in conflicting roles | SoD check passes |
Evidence Collection Checklist
- Screenshot: Security groups list
- Screenshot: Group membership for each role
- Screenshot: PIM eligible assignments
- Screenshot: Access review schedule
- Export: SoD validation report (CSV)
- Screenshot: Approval workflow blocking self-approval
Attestation Statement Template
## Control 2.8 Attestation - Access Control and Segregation of Duties
**Organization:** [Organization Name]
**Control Owner:** [Name/Role]
**Date:** [Date]
I attest that:
1. Security groups are established for agent governance roles:
- Developers: [Count] members
- Reviewers: [Count] members
- Approvers: [Count] members
- Release Managers: [Count] members
- Platform Admins: [Count] members
2. Segregation of duties is enforced:
- Creators cannot approve own work
- Approvers cannot deploy
- No single person can complete end-to-end deployment
3. Privileged Identity Management is configured:
- Admin roles require activation
- Activation requires justification
- [Approval required for Zone 3: Yes/No]
4. Access reviews are scheduled:
- Frequency: [Quarterly/Monthly]
- Last review: [Date]
- Completion rate: [Percentage]
**Last SoD Audit:** [Date]
**Violations Found:** [Count or None]
**Signature:** _______________________
**Date:** _______________________
Back to Control 2.8 | Portal Walkthrough | PowerShell Setup | Troubleshooting