💼 8.2.6 Inactive user accounts are removed or disabled within 90 days of inactivity.
- ID:
/frameworks/pci-dss-v4.0.1/08/02/06
Description
Empty...
Similar
- Sections
/frameworks/pci-dss-v4.0/08/02/06/frameworks/aws-fsbp-v1.0.0/iam/08
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [IAM.8] Unused IAM user credentials should be removed | 1 | no data | |||
| 💼 PCI DSS v4.0 → 💼 8.2.6 Inactive user accounts are removed or disabled within 90 days of inactivity. | 1 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 PCI DSS v4.0 → 💼 8.2.6 Inactive user accounts are removed or disabled within 90 days of inactivity. | 1 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (1)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS IAM User with credentials unused for 45 days or more is not disabled🟢 | 1 | 🟢 x6 | no data |