Skip to main content

Deny access with inactive credentials

Summary​

The system must not allow users to authenticate with expired, revoked or blocked credentials.

Description​

. Inactive credentials pose a security risk to organizations. Each one of these accounts offers a malicious actor an opportunity to gain access to resources.

Supported In​

This requirement is verified in following services

PlanSupported
Essential🔴
Advanced🟢

References​

free trial

Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.