Skip to main content

Description

Identify AWS IAM SSH public keys that have been active for more than 90 days without rotation.

Ensure that all IAM SSH public keys are rotated at least every 90 days to reduce the risk of accidental exposure and to protect AWS CodeCommit repositories from unauthorized access.

Rationaleโ€‹

IAM SSH public keys are used to authenticate users for programmatic access to services such as AWS CodeCommit. Similar to passwords and access keys, these credentials should be rotated regularly. Regular key rotation limits the amount of time a compromised key can be used to access source code repositories.

Auditโ€‹

This policy flags an AWS IAM SSH Public Key as INCOMPLIANT if the Upload Date is older than 90 days.

An AWS IAM SSH Public Key is marked as INAPPLICABLE if its Status is not set to Active.