5.3
IG1 IG2 IG3

Disable Dormant Accounts

Control Group: 5. Account Management
Asset Type: Users
Security Function: Respond

Description

Delete or disable any dormant accounts after a period of 45 days of inactivity, where supported.

Implementation Checklist

1
Define response procedures and playbooks
2
Assign response roles and responsibilities
3
Establish response timeframes and SLAs
4
Test response procedures through tabletop or simulation
5
Document lessons learned and update procedures
6
Identify inactive and dormant accounts
7
Configure automatic account disablement policy
8
Establish account lifecycle management process

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Dormant Account Takeover by External Attackers

Confidentiality

Attackers compromise dormant accounts through credential stuffing or phishing, using them for persistent access since inactive accounts are rarely monitored for suspicious activity.

Former Contractor Access via Inactive Account

Confidentiality

A former contractor's account remains active and unmonitored for months after contract end, providing an entry point if the contractor turns hostile or their credentials are leaked.

Vulnerabilities (When Safeguard Absent)

Dormant Accounts Remain Active Indefinitely

Without automatic disabling after 45 days of inactivity, dormant accounts from departed users, completed projects, or seasonal workers persist as latent access vectors.

No Automated Inactivity Detection for Accounts

Without automated monitoring of account login activity, the organization cannot identify which accounts are dormant and should be disabled or reviewed.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Response procedure/playbook documentation Reviewed bi-annually
Record Response action logs showing procedure execution Per incident
Document Governing policy document (current, approved, communicated) Reviewed annually