Deny access with inactive credentials
Summary
The system must not allow users to authenticate with expired, revoked or blocked credentials.
Description
. Inactive credentials pose a security risk to organizations. Each one of these accounts offers a malicious actor an opportunity to gain access to resources.
References
- HIPAA-164_310_a_2_iii. Access control and validation procedures (addressable)
- NERCCIP-004-6_R5. Access revocation
- OWASP10-A7. Identification and authentication failures
- SOC2-CC6_2. Logical and physical access controls
- MITRE-M1043. Credential access protection
- CMMC-AC_L2-3_1_10. Session lock
- CMMC-IA_L2-3_5_6. Identifier handling
- FEDRAMP-AC-11. Session lock
- FEDRAMP-PE-3. Physical access control
- ISO27002-7_2. Physical entry controls
- LGPD-46. Security and Secrecy of Data
- IEC62443-UC-2_1. Authorization enforcement
- WASSEC-2_1. Authentication schemes
- WASC-W_02. Insufficient authorization
- NISTSSDF-PW_1_1. Design software to meet security requirements and mitigate security risks
- OWASPRISKS-P8. Missing or insufficient session expiration
- BSAFSS-IA_1-2. Software development environment authenticates users and operators
- BSAFSS-AA_1-3. Authorization and access controls
- NIST800171-5_6. Disable identifiers after a defined period of inactivity
- CWE25-287. Improper authentication
- SIGLITE-SL_45. Termination or change of status process?
- ISO27001-7_2. Physical entry controls
- SANS25-13. Improper authentication
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.
Supported In
This requirement is verified in following services
Essential Plan
No
Advanced Plan
Yes