Government
GOV-02Medium

Automatically Disable Stale Accounts for Government & Public Sector

How government & public sector organizations should implement GOV-02 for Microsoft 365 security and compliance.

For government & public sector companies using Microsoft 365, automatically disable stale accounts is a security priority. This guide explains how GOV-02 helps government & public sector organizations protect their identity infrastructure while meeting industry-specific compliance mandates.

Why Government & Public Sector Organizations Need This Control

Government & Public Sector organizations face specific regulatory requirements including fedramp, nist-800-53, cis. The GOV-02 control helps address these requirements by:

  • Accounts inactive for 90+ days are automatically disabled
  • A warning notification is sent 14 days before disabling
  • Emergency access accounts and service accounts are excluded

Manual reviews miss accounts. Automated disabling ensures that former employees, forgotten accounts, and inactive identities cannot be used by attackers. The 14-day warning prevents disruption for legitimate users.

Industry-Specific Considerations

When implementing GOV-02 in a government & public sector environment, consider:

  • **Regulatory requirements**: fedramp, nist-800-53, cis may mandate specific configurations
  • **Risk tolerance**: Government & Public Sector organizations typically have moderate to low risk tolerance
  • **Audit frequency**: Plan for regular compliance reviews
  • **Documentation**: Maintain detailed records for regulatory inspections

How to Configure

GOV-02 requires the following configuration:

  • Accounts inactive for 90+ days are automatically disabled
  • A warning notification is sent 14 days before disabling
  • Emergency access accounts and service accounts are excluded

TrueConfig can automate stale account disabling with exclusion lists

With TrueConfig, you can implement this control automatically using our one-click remediation feature.

Government Compliance Requirements

Government organizations must comply with these frameworks, all of which address automatically disable stale accounts:

Why This Control Matters for Government

Manual reviews miss accounts. Automated disabling ensures that former employees, forgotten accounts, and inactive identities cannot be used by attackers. The 14-day warning prevents disruption for legitimate users.

Common threats in government & public sector:

  • Nation-state espionage campaigns
  • Ransomware targeting critical services
  • Insider threats from privileged users

For government & public sector organizations, GOV-02 is a key component of a compliant Microsoft 365 security posture. TrueConfig helps you implement and maintain this control while meeting industry-specific requirements.

Ready to secure your government Microsoft 365 environment?

TrueConfig continuously monitors your tenant against government best practices, including this control and 6+ others.