πΌ 8.1.4 Remove/disable inactive user accounts within 90 days.
- Contextual name: πΌ 8.1.4 Remove/disable inactive user accounts within 90 days.
- ID:
/frameworks/pci-dss-v3.2.1/08/01/04
- Located in: πΌ 8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and administrators on all system components.
Descriptionβ
Empty...
Similarβ
- Sections
/frameworks/pci-dss-v4.0/08/02/06
/frameworks/aws-fsbp-v1.0.0/iam/08
- Internal
- ID:
dec-c-8f116b54
- ID:
Similar Sections (Take Policies From)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [IAM.8] Unused IAM user credentials should be removed | 1 | |||
πΌ PCI DSS v4.0 β πΌ 8.2.6 Inactive user accounts are removed or disabled within 90 days of inactivity. | 1 |
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ PCI DSS v4.0 β πΌ 8.2.6 Inactive user accounts are removed or disabled within 90 days of inactivity. | 1 |
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (1)β
Policy | Logic Count | Flags |
---|---|---|
π AWS IAM User with credentials unused for 45 days or more is not disabled π’ | 1 | π’ x6 |