Privilege escalation is the skeleton key for breaching critical infrastructure. NIST 800-53 treats it as a core risk. The framework calls for strict control of user roles, process boundaries, and chained exploits that turn a small foothold into total compromise. If you let it happen, every other safeguard unravels fast.
NIST 800-53 addresses privilege escalation through precise families of controls. AC (Access Control), IA (Identification and Authentication), and SI (System and Information Integrity) lay out how to define, verify, and limit privileges. AC-6 enforces least privilege, requiring accounts to have only the rights needed. IA-2 demands proof that each identity is valid before access is granted. SI-4 detects anomalies that may signal an escalation in progress. Together they create a layered brake system against unauthorized gain of power in your environment.
Attackers use both vertical and horizontal privilege escalation. Vertical moves from a standard account to admin. Horizontal moves between accounts of the same apparent level, exploiting shared weaknesses. NIST 800-53 insists on controls that block both—continuous monitoring, audit trails, and session isolation play a central role. Misconfigurations, weak authentication, and unpatched systems are common doors left open. Closing them is a matter of process discipline and regular testing.