Skip to main content

CCC.IAM.C08: Maximum Age for Unused Credentials

Control ID:CCC.IAM.C08
Title:Maximum Age for Unused Credentials
Objective:Ensure that unused IAM credentals are removed to reduce exposure in the event of potential compromise.
Control Family:
Identity Provisioning and Lifecycle

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.IAM.TH11Unused CredentialsUnused IAM identity that is no longer needed or monitored remains active. Its compromise is less likely to be detected, and it represents a persistent, unnecessary attack surface.
1
1
0
CCC.IAM.TH01Valid Cloud Credentials AbuseValid identity credentials such as access keys, tokens or passwords are misused or compromised. Examples include public exposure, token theft, unprotected metadata service of a compromised compute instance or brute-force attacks. The use of these credentials can provide unauthorized access to the cloud environment, potentially bypassing other security controls and enabling lateral movement across cloud resources.
1
1
0

Related Capabilities

IDTitleDescription
CCC.IAM.F02IAM UsersAbility to create, manage, list and delete IAM users. IAM user represents a single person or application.
CCC.IAM.F03Long-Term CredentialsAbility to create, manage, list and delete long-term credentials such as access keys and service account keys.
CCC.IAM.F04Password ManagementAbility to create, change and delete IAM user passwords.
CCC.IAM.F06IAM Roles / Service PrincipalsAbility to create, manage, list and delete IAM roles. IAM role is an identity for applications or services to access resources.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.AA-01
0
-
NIST_800_53
AC-2
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.IAM.C08.TR01When an IAM user has credentials, such as passwords or access keys, that have not been used for 90 days or more, the unused credentials MUST be removed or deactivated.
tlp-clear
tlp-green
tlp-amber
tlp-red