π AWS IAM User with credentials unused for 45 days or more is not disabled π’
- Contextual name: π User with credentials unused for 45 days or more is not disabled π’
- ID:
/ce/ca/aws/iam/disable-user-with-unused-credentials-45-days-and-more
- Located in: π AWS IAM
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-ac93bf15
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-ac93bf15 | 1 |
Logicβ
- π§ prod.logic.yaml π’
- π AWS IAM User
- π AWS IAM User - credReport.extracts.yaml
- π§ͺ test-data.json
Descriptionβ
Descriptionβ
AWS IAM users can access AWS resources using different types of credentials, such as passwords or access keys. It is recommended that all credentials that have been unused in 45 or greater days be deactivated or removed.
Rationaleβ
Disabling or removing unnecessary credentials will reduce the window of opportunity for credentials associated with a compromised or abandoned account to be used.
Auditβ
Perform the following to determine if unused credentials exist:
From Consoleβ
- Login to the AWS Management Console.
- Click
Services
.- Click
IAM
.- Click on
Users
.- Click the
Settings
(gear) icon.- Select
Console last sign-in
,Access key last used
, andAccess Key Id
.- Click on
Close
.- Check and ensure that
Console last sign-in
is less than 45 days ago.Note:
Never
means the user has never logged in.
- Check and ensure that
Access key age
is less than45
days and thatAccess key last used
does not sayNone
.If the user hasn't signed into the Console in the last
45
days or Access keys are over 45 days old refer to the remediation.... see more
Remediationβ
Remediationβ
From Consoleβ
Perform the following to manage Unused Password (IAM user console access):
- Login to the AWS Management Console.
- Click
Services
.- Click
IAM
.- Click on
Users
.- Click on
Security Credentials
.- Select user whose
Console last sign-in
is greater than45
days.- Click
Security credentials
.- In section
Sign-in credentials
,Console password
clickManage
.- Under Console Access select
Disable
.- Click
Apply
.Perform the following to deactivate Access Keys:
- Login to the AWS Management Console.
- Click
Services
.- Click
IAM
.- Click on
Users
.- Click on
Security Credentials
.- Select any access keys that are over 45 days old and that have been used and click on
Make Inactive
.- Select any access keys that are over 45 days old and that have not been used and click the X to
Delete
.