3.5.6: Disable identifiers after a defined period of inactivity
Control Family:
Control Type:
Derived
CSF v1.1 References:
Discussion
Inactive identifiers pose a risk to organizational information because attackers may exploit an inactive identifier to gain undetected access to organizational devices. The owners of the inactive accounts may not notice if unauthorized access to the account has been obtained.