Skip to content

add(control): IAM controls #827

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

gabriellavengeo
Copy link
Contributor

No description provided.

@gabriellavengeo gabriellavengeo requested a review from a team as a code owner July 14, 2025 16:14
Copy link

netlify bot commented Jul 14, 2025

Deploy Preview for common-cloud-controls ready!

Name Link
🔨 Latest commit 4fc81c9
🔍 Latest deploy log https://app.netlify.com/projects/common-cloud-controls/deploys/687e3df610425f000972811e
😎 Deploy Preview https://deploy-preview-827--common-cloud-controls.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link
Contributor

@zigmax zigmax left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add few recommendations

- tlp-green
- tlp-amber
- tlp-red
recommendation: ""
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IAM user credentials (such as passwords or access keys) that have not been used for 90 days or more must be automatically removed or deactivated.

- tlp-green
- tlp-amber
- tlp-red
recommendation: ""
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When a static credential such as an access key has existed for 90 days or more, it must be automatically rotated to reduce the risk of compromise due to long-term exposure. Organizations should implement automated checks to identify aging credentials and enforce rotation policies. Additionally, access key usage should be regularly monitored, and credentials that are no longer in use should be deactivated or deleted promptly. Where possible, prefer temporary, short-lived credentials over long-lived static ones to further minimize risk.

- tlp-green
- tlp-amber
- tlp-red
recommendation: ""
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When a new cloud account is provisioned, a password policy must be configured for all IAM users to align with the minimum requirements defined in PCI DSS v4.0.1. This includes, at a minimum:

  • A password length of at least 12 characters.
  • A mix of upper- and lower-case letters, numbers, and special characters.
  • Prevention of the use of previously used passwords (password history).
  • Password expiration at a defined interval (e.g., every 90 days).
  • Account lockout after a defined number of failed login attempts.

@gabriellavengeo
Copy link
Contributor Author

Thank you for the review and suggestions @zigmax, I pushed an update adding the recommendations you suggested

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants