3.5.6: Disable identifiers after a defined period of inactivity

Control Type:

Derived

CSF v1.1 References:

Discussion

Inactive identifiers pose a risk to organizational information because attackers may exploit an inactive identifier to gain undetected access to organizational devices. The owners of the inactive accounts may not notice if unauthorized access to the account has been obtained.