Disable Inactive User Credentials
Learn how to detect and disable inactive user accounts across AWS, GitHub, Google Workspace, Office365, and Okta using Sprinto’s automated monitors and access management workflows.
Inactive user accounts pose a significant security risk. They are often overlooked during access reviews and can be exploited by malicious actors if not properly deactivated. Sprinto monitors inactivity across integrated services and flags accounts that appear unused over a defined time window.
This article explains how Sprinto detects inactivity, how to interpret failing monitors, and how to disable stale credentials on supported platforms.
What is Checked
Sprinto checks for user accounts that meet the following conditions:
Have not logged in or authenticated in the past 30/60/90 days (depending on the platform)
Still retain access to cloud services, source control tools, or identity providers
Are not marked as service accounts or intentionally excluded
How Sprinto Detects Inactivity
Sprinto uses integration data (via APIs or logs) to analyse:
Last login timestamp
Token usage (for platforms like AWS, GitHub)
Activity logs (for platforms like GCP, Azure, Office365)
The monitor will show as Failing if:
An active user has not logged in during the specified inactivity window
Login records are not available and evidence is not uploaded
A user was never onboarded properly but is provisioned
Platforms Covered
AWS IAM
Checks last used time for user access keys and console login
Recommends disabling or deleting keys for inactive IAM users
GitHub
Checks contribution and login activity for organisation members
Highlights users who haven’t interacted with any repositories recently
Google Workspace
Detects users with no email, calendar, or Drive activity
Suggests suspension of dormant accounts
Office365 / Microsoft Entra
Uses sign-in logs and account activity data
Flags accounts with no recent sign-in or resource access
Okta
Evaluates user sign-in data and SSO application access
Highlights users with no app activity
How to Disable Inactive Users
The recommended approach is to suspend or deactivate the user account instead of deleting it outright. This preserves logs and avoids breaking access dependencies.
AWS
Go to IAM > Users
Select user → Security Credentials
Deactivate access keys or delete user
Optionally remove group/role assignments
GitHub
Go to Organisation Settings > People
Select inactive user and click Remove from organisation
Reassign repo access if needed
Google Workspace
Go to Admin Console > Users
Select user → Click Suspend User
Confirm suspension
Office365
Open Microsoft Entra Admin Center
Go to Users > All users
Select user → Click Block sign-in
Optionally remove license
Okta
Navigate to Directory > People
Select user → Click Deactivate
Confirm and review app assignments
Remediating the Monitor in Sprinto
After disabling the inactive user, Sprinto will reflect the updated status during the next sync
For platforms where integration is not available:
Upload a screenshot or export of the deactivated user status
Use Mark as Resolved after evidence is added
Best Practices
Run monthly access reviews to identify unused accounts
Use provisioning rules or SCIM to auto-deactivate stale users
Maintain a naming convention for service accounts
Log reasons for deactivation for future audits
Last updated