Skip to main content

πŸ’Ό AC-2(3) Account Management | Disable Accounts

  • Contextual name: πŸ’Ό AC-2(3) Account Management | Disable Accounts
  • ID: /frameworks/nist-sp-800-53-r5/ac/02/03
  • Located in: πŸ’Ό AC-2 Account Management

Description​

Disable accounts within [Assignment: organization-defined time period] when the accounts: (a) Have expired; (b) Are no longer associated with a user or individual; (c) Are in violation of organizational policy; or (d) Have been inactive for [Assignment: organization-defined time period].

Similar​

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/iam/03
    • /frameworks/aws-fsbp-v1.0.0/iam/07
    • /frameworks/aws-fsbp-v1.0.0/iam/08
  • Internal
    • ID: dec-c-96950234

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [IAM.3] IAM users' access keys should be rotated every 90 days or less11
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [IAM.7] Password policies for IAM users should have strong configurations12
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [IAM.8] Unused IAM user credentials should be removed1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AC-2(3) Disable Accounts (M)(H)4

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (4)​

PolicyLogic CountFlags
πŸ“ AWS Account IAM Password Policy minimum password length is 14 characters or less 🟒1🟒 x6
πŸ“ AWS Account IAM Password Policy Number of passwords to remember is not set to 24 🟒1🟒 x6
πŸ“ AWS IAM User Access Keys are not rotated every 90 days or less 🟒1🟒 x6
πŸ“ AWS IAM User with credentials unused for 45 days or more is not disabled 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-bcb0c78f1