Checks whether the validity period of a CloudSSO System for Cross-domain Identity Management (SCIM) credential is within the specified number of days. If so, the evaluation result is Compliant. The default number of days is 90.
Scenarios
Ensure that only authorized users can access the system, protecting user data and effectively reducing security risks.
Risk level
Default risk level: high.
When you apply this rule, you can change the risk level based on your business requirements.
Compliance evaluation logic
If the validity period of a CloudSSO SCIM credential is within the specified number of days, the evaluation result is Compliant. The default number of days is 90.
If the validity period of a CloudSSO SCIM credential is not within the specified number of days, the evaluation result is Non-compliant.
Rule details
Item | Description |
Rule name | cloudsso-scim-credential-expired-check |
Rule ID | |
Tag | CloudSSO |
Automatic remediation | Not supported |
Trigger type | Periodic execution |
Evaluation frequency | Every 24 hours |
Supported resource type | CloudSSO SCIM credential |
Input parameter | days. Default value: 90, in days |
Non-compliance remediation
Ensure that the validity period of a CloudSSO SCIM credential is within the specified number of days. For more information, see Manage SCIM credentials.