Skip to main content

💼 8.1.4 Remove/disable inactive user accounts within 90 days.

  • ID: /frameworks/pci-dss-v3.2.1/08/01/04

Description

Empty...

Similar

  • Sections
    • /frameworks/pci-dss-v4.0/08/02/06
    • /frameworks/aws-fsbp-v1.0.0/iam/08
  • Internal
    • ID: dec-c-8f116b54

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [IAM.8] Unused IAM user credentials should be removed1no data
💼 PCI DSS v4.0 → 💼 8.2.6 Inactive user accounts are removed or disabled within 90 days of inactivity.1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 PCI DSS v4.0 → 💼 8.2.6 Inactive user accounts are removed or disabled within 90 days of inactivity.1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS IAM User with credentials unused for 45 days or more is not disabled🟢1🟢 x6no data