An engineer bypassed the lock at 2:14 a.m. The system logged every step. The access wasn’t casual—it was Break Glass.
Break Glass access procedures define the strict, emergency-only path to override normal security controls. In the language of NIST 800-53, it’s about controlled, auditable access to systems when no other option exists. The goal is speed without chaos. The price is proof—proof that the bypass was justified, short, and fully documented.
NIST 800-53 doesn’t treat Break Glass as a loophole. It treats it as a controlled exception. Controls like AC-2, AC-5, and AU-2 set the requirement to track accounts, enforce least privilege, and log all activities. You don’t get to skip those just because it’s an emergency. You still need multi-factor, time limits, and a trail you can follow after the fact.
Good procedures separate Break Glass from day-to-day privileged access. Use distinct accounts with hardened authentication. Keep them disabled until the moment they’re needed. Force every use to trigger alerts. Tie them to automated logging that can’t be altered. Review the use within hours—not days.