Loading controls...
Benchmark: 3.5.6 Disable identifiers after a defined period of inactivity
Description
Inactive identifiers pose a risk to organizational information because attackers may exploit an inactive identifier to gain undetected access to organizational devices. The owners of the inactive accounts may not notice if unauthorized access to the account has been obtained.
Usage
Browse dashboards and select 3.5.6 Disable identifiers after a defined period of inactivity:
steampipe dashboard
Or run the benchmarks in your terminal:
steampipe check aws_compliance.benchmark.nist_800_171_rev_2_3_5_6
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share aws_compliance.benchmark.nist_800_171_rev_2_3_5_6
Controls
- IAM password policies for users should have strong configurations
- IAM user credentials that have not been used in 90 days should be disabled