Skip to main content
← All controls
IA-5(1) / A.9.2.4 / CIS-5.3 NIST SP 800-53 Rev 5

Credential rotation

Demonstrate that the organization systematically rotates authentication credentials according to defined policies, maintains evidence of rotation activities, and enforces these policies across all credential types and environments.

Description

What this control does

Credential rotation involves the periodic, scheduled replacement of authentication credentials including passwords, API keys, certificates, and service account secrets to minimize the window of opportunity for compromised credentials to be exploited. Rotation policies define intervals based on credential type, sensitivity, and regulatory requirements, with automated processes provisioning new credentials and safely decommissioning old ones. This control reduces the residual risk from undetected credential theft, insider threats, or credentials inadvertently exposed in logs, repositories, or insecure storage.

Control objective

What auditing this proves

Demonstrate that the organization systematically rotates authentication credentials according to defined policies, maintains evidence of rotation activities, and enforces these policies across all credential types and environments.

Associated risks

Risks this control addresses

  • Stolen credentials remain valid indefinitely, allowing prolonged unauthorized access by external attackers who obtained them through phishing, malware, or breach
  • Hardcoded API keys and service account passwords in source code or configuration files persist unchanged, creating long-term exposure if repositories are compromised
  • Certificates expire unexpectedly due to lack of rotation tracking, causing service outages and authentication failures
  • Former employees or contractors retain access through unchanged shared credentials or service accounts they once used
  • Credentials leaked in logs, error messages, or cloud metadata services remain exploitable for extended periods without rotation
  • Compromised credentials from third-party breaches go undetected and continue to grant access when users reuse passwords across systems
  • Privileged accounts with static passwords provide persistent backdoors for advanced persistent threats conducting long-term reconnaissance

Live threat patterns this control mitigates:

Testing procedure

How an auditor verifies this control

  1. Obtain the organization's credential rotation policy and identify defined rotation intervals for each credential type (user passwords, service accounts, API keys, certificates, SSH keys, database credentials).
  2. Request an inventory of all systems, applications, and services that authenticate using credentials subject to rotation requirements.
  3. Select a representative sample of at least 15-20 credentials spanning different types and environments (production, development, privileged accounts, service accounts).
  4. Review credential management system logs or IAM platform audit trails to verify the last rotation date for each sampled credential.
  5. Compare actual rotation dates against policy-defined intervals to identify any credentials that exceeded their maximum age without rotation.
  6. Examine automated rotation workflows or scripts to confirm technical implementation matches policy requirements and includes secure credential distribution mechanisms.
  7. Interview system owners for credentials found to be overdue and review exception documentation or compensating controls if rotation was deferred.
  8. Test a subset of legacy or externally-managed credentials (third-party SaaS integrations, cloud provider keys) to verify rotation processes extend beyond internally-managed systems.
Evidence required Collect credential rotation policy documents, credential inventory spreadsheets or CMDB exports, screenshots or exports from IAM platforms showing credential creation and last-changed dates, audit logs from secret management systems (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault) documenting rotation events, configuration files or infrastructure-as-code showing automated rotation jobs, exception requests with risk acceptance signatures for credentials exceeding rotation intervals, and interview notes from system administrators describing rotation procedures.
Pass criteria At least 95% of sampled credentials have been rotated within their policy-defined intervals, all credential types are covered by documented rotation requirements, automated rotation mechanisms are operational for high-value credentials, and documented exceptions with compensating controls exist for any overdue credentials.

Where this control is tested

Audit programs including this control