Skip to main content

CCC.IAM.C06: Maximum Age for Long-Term Static Credentials

Control ID:CCC.IAM.C06
Title:Maximum Age for Long-Term Static Credentials
Objective:Ensure that long-lived static credentials like access keys are programmatically rotated within a defined time period to limit the window of opportunity if compromised.
Control Family:
Identity Provisioning and Lifecycle

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.IAM.TH09Long-Lived Static CredentialsLong-lived static credentials such as access keys for an identity are used and not rotated periodically according to security best practices, extending exposure in the event of credentials compromise.
1
1
0
CCC.IAM.TH01Valid Cloud Credentials AbuseValid identity credentials such as access keys, tokens or passwords are misused or compromised. Examples include public exposure, token theft, unprotected metadata service of a compromised compute instance or brute-force attacks. The use of these credentials can provide unauthorized access to the cloud environment, potentially bypassing other security controls and enabling lateral movement across cloud resources.
1
1
0

Related Capabilities

IDTitleDescription
CCC.IAM.F02IAM UsersAbility to create, manage, list and delete IAM users. IAM user represents a single person or application.
CCC.IAM.F03Long-Term CredentialsAbility to create, manage, list and delete long-term credentials such as access keys and service account keys.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.AA-01
0
-
NIST_800_53
AC-2
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.IAM.C06.TR01When a static credential such as an access key has existed for 90 days or more, it MUST be rotated.
tlp-clear
tlp-green
tlp-amber
tlp-red