Check: SRG-APP-000163-CTR-000395
Container Platform SRG:
SRG-APP-000163-CTR-000395
(in versions v1 r5 through v1 r1)
Title
The container platform must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. (Cat II impact)
Discussion
Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can potentially obtain and maintain undetected access to the application. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Applications need to track periods of inactivity and disable application identifiers after 35 days of inactivity. Management of user identifiers is not applicable to shared information system accounts (e.g., guest and anonymous accounts). It is commonly the case that a user account is the name of an information system account associated with an individual. To avoid having to build complex user management capabilities directly into their application, wise developers leverage the underlying OS or other user account management infrastructure (AD, LDAP) that is already in place within the organization and meets organizational user account management requirements.
Check Content
Review the container platform configuration to determine if the container platform is configured to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. If identifiers are not disabled after 35 days of inactivity, this is a finding.
Fix Text
Configure the container platform to disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
Additional Identifiers
Rule ID: SV-233087r879600_rule
Vulnerability ID: V-233087
Group Title: SRG-APP-000163
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000795 |
The organization manages information system identifiers by disabling the identifier after an organization-defined time period of inactivity. |
Controls
Number | Title |
---|---|
IA-4 |
Identifier Management |