Skip to main content

CCC.IAM.CN06: Maximum Age for Long-Term Static Credentials

Control ID:CCC.IAM.CN06
Title:Maximum Age for Long-Term Static Credentials
Objective:Ensure that long-lived static credentials like access keys are programmatically rotated within a defined time period to limit the window of opportunity if compromised.
Control Family:
Identity Provisioning and Lifecycle

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.IAM.TH01Valid Cloud Credentials AbuseValid identity credentials such as access keys, tokens or passwords are misused or compromised. Examples include public exposure, token theft, unprotected metadata service of a compromised compute instance or brute-force attacks. The use of these credentials can provide unauthorized access to the cloud environment, potentially bypassing other security controls and enabling lateral movement across cloud resources.
1
1
0
CCC.IAM.TH09Long-Lived Static CredentialsLong-lived static credentials such as access keys for an identity are used and not rotated periodically according to security best practices, extending exposure in the event of credentials compromise.
1
1
0

Related Capabilities

IDTitleDescription
CCC.IAM.CP02IAM UsersAbility to create, manage, list and delete IAM users. IAM user represents a single person or application.
CCC.IAM.CP03Long-Term CredentialsAbility to create, manage, list and delete long-term credentials such as access keys and service account keys.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.AA-01
0
-
NIST_800_53
AC-2
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.IAM.CN06.AR01When a static credential such as an access key has existed for 90 days or more, it MUST be rotated.
tlp-clear
tlp-green
tlp-amber
tlp-red