logo

Database

Summary

The system must not allow users to authenticate with expired, revoked or blocked credentials.

Description

. Inactive credentials pose a security risk to organizations. Each one of these accounts offers a malicious actor an opportunity to gain access to resources.

Supported In

This requirement is verified in following services

Essential Plan

No

Advanced Plan

Yes