Skip to main content

CCC.SecMgmt.C01: Enforce Automatic Secret Rotation

Control ID:CCC.SecMgmt.C01
Title:Enforce Automatic Secret Rotation
Objective:Ensure that secrets are automatically rotated on a defined schedule to reduce the risk of secret compromise and unauthorized access.
Control Family:
Data Protection

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Core.TH01Access is Granted to Unauthorized UsersLogic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.
1
1
0
CCC.Core.TH14Older Resource Versions are UsedRunning older versions of child resources can expose the system to known vulnerabilities that have been addressed in more recent versions. If the version identifier is detected by an attacker, it may be possible to exploit these vulnerabilities to compromise the confidentiality, integrity, or availability of the system and its data.
1
1
0

Related Capabilities

IDTitleDescription
CCC.Core.F06Access ControlThe service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.DS-6
0
-
NIST_800_53
SC-12
0
-
NIST_800_53
SC-28
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.SecMgmt.C01.TR01Attempt to use an outdated version of a secret after its rotation period has passed and verify that access is denied.
tlp-red
tlp-amber