This rule ensures disabling credentials unused for 180 days or more to enhance security measures.
Rule | Ensure credentials unused for 180 days or greater are disabled |
Framework | CloudDefense.AI Security |
Severity | ✔ Critical |
Rule Description:
The rule mandates that any credentials that have been unused for 180 days or longer should be disabled for CloudDefense. This is an important security measure to reduce the risk of unauthorized access to sensitive information and resources within the Cloud Defense platform.
Troubleshooting Steps:
Necessary Codes:
There are no specific codes required for this rule. However, implementing a script or automation tool can help to identify and disable the unused credentials efficiently.
Step-by-step Guide for Remediation:
Login to the Cloud Defense platform using your administrator credentials.
Navigate to the "Credentials Management" section or similar in the Cloud Defense platform. This may vary depending on the platform or service provider.
Obtain a list of all active credentials within the Cloud Defense platform.
For each credential in the list, perform the following steps:
Step 4.1: Determine the last time the credential was used.
Step 4.2: Compare the last usage date with the current date.
Step 4.3: Identify credentials that have been unused for 180 days or longer.
Step 4.4: Disable the identified credentials.
Repeat Steps 4.1 to 4.4 for all credentials in the list.
Verify that the identified credentials have been successfully disabled.
Document the disabled credentials and the actions taken for future reference.
By following the above steps, you can ensure that any credentials that have been unused for 180 days or longer are disabled in the Cloud Defense platform, thereby reducing the risk of unauthorized access and enhancing the overall security posture.