turbot/aws_compliance

GitHub
Loading controls...

Benchmark: 3.5.6 Disable identifiers after a defined period of inactivity

Description

Inactive identifiers pose a risk to organizational information because attackers may exploit an inactive identifier to gain undetected access to organizational devices. The owners of the inactive accounts may not notice if unauthorized access to the account has been obtained.

Usage

Browse dashboards and select 3.5.6 Disable identifiers after a defined period of inactivity:

steampipe dashboard

Or run the benchmarks in your terminal:

steampipe check aws_compliance.benchmark.nist_800_171_rev_2_3_5_6

Snapshot and share results via Steampipe Cloud:

steampipe login
steampipe check --share aws_compliance.benchmark.nist_800_171_rev_2_3_5_6

Controls

Tags