Identifying and Deleting Unused Environments for Improved Security
Unused environments can pose potential security risks, as they may be targeted by malicious actors. Regularly deleting environments that are no longer in use helps reduce the attack surface and enhances overall security. In some cases, compliance requirements may also mandate the removal of inactive environments.
To identify and delete an unused environment:
-
Sign in to the environment and view the latest Activity Report. See Using the Activity Report.
-
In the Number of Users table, if all values are zero, it indicates the environment has been inactive for at least 30 days. See User Information.
- If you decide to delete an environement, see Deleting an Environment.
Note:
- You can delete a test or production environment individually. It’s not necessary to delete both if only one is unused.
- Deleting an environment permanently removes all data within it and invalidates its URLs. All its backups are also deleted 60 days after the deletion. If you don't plan to recreate the environment within 60 days, ensure you back up any important data and snapshots before proceeding.