π‘οΈ AWS IAM Access Key is unusedπ’
- Contextual name: π‘οΈ IAM Access Key is unusedπ’
- ID:
/ce/ca/aws/iam/access-key-unused - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
BEST_PRACTICE - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [IAM.8] Unused IAM user credentials should be removed
- Cloud Conformity: Unnecessary Access Keys
Descriptionβ
Descriptionβ
Identify and remove unused IAM access keys to protect AWS resources from unauthorized access. An IAM user access key pair is considered unused if it has not been used for a specified period, in this case, 90 days.
Rationaleβ
IAM access keys provide programmatic access to AWS resources. Retaining active keys that are no longer in use increases the risk that lost or compromised credentials could be exploited. By evaluating access keys directly (rather than IAM users), security teams can precisely identify which credentials require revocation.
Auditβ
This policy flags an AWS IAM Access Key as
INCOMPLIANTif theLast Used Datefield is empty or the date is beyond the past 90 days.Inactive Access Keys are marked as
INAPPLICABLE.
Remediationβ
Remediationβ
Decommission Unused IAM Access Keysβ
Deactivate any unnecessary or unused IAM access keys to reduce the risk of unauthorized access.
From Command Lineβ
Run the
update-access-keycommand to deactivate an unused or non-operational IAM access key:aws iam update-access-key \
--access-key-id {{access-key-id}} \
--status InactiveAfter deactivation, verify that the key is no longer required by any applications or services. Once confirmed, consider deleting the access key to permanently remove it:
aws iam delete-access-key \
--access-key-id {{access-key-id}}