π AWS IAM User Access Keys are not rotated every 90 days or less π’
- Contextual name: π User Access Keys are not rotated every 90 days or less π’
- ID:
/ce/ca/aws/iam/user-access-keys-are-not-rotated-every-90-days
- Located in: π AWS IAM
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-bcb0c78f
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-bcb0c78f | 1 |
Logicβ
- π§ prod.logic.yaml π’
- π AWS IAM User
- π AWS IAM User - credReport.extracts.yaml
- π§ͺ test-data.json
Descriptionβ
Descriptionβ
Access keys consist of an access key ID and secret access key, which are used to sign programmatic requests that you make to AWS. AWS users need their own access keys to make programmatic calls to AWS from the AWS Command Line Interface (AWS CLI), Tools for Windows PowerShell, the AWS SDKs, or direct HTTP calls using the APIs for individual AWS services. It is recommended that all access keys be regularly rotated.
Rationaleβ
Rotating access keys will reduce the window of opportunity for an access key that is associated with a compromised or terminated account to be used.
Access keys should be rotated to ensure that data cannot be accessed with an old key which might have been lost, cracked, or stolen.
Auditβ
Perform the following to determine if access keys are rotated as prescribed:
From Consoleβ
- Go to Management Console.
- Click on
Users
.- For each user, go to
Security Credentials
.- Review each key under
Access Keys
.- For each key that shows
Active
for status, ensure thatCreated
is less than or equal to 90 days ago.... see more
Remediationβ
Remediationβ
Perform the following to rotate access keys:
From Consoleβ
- Go to Management Console.
- Click on
Users
.- Click on
Security Credentials
.- As an Administrator:
- Click on
Make Inactive
for keys that have not been rotated in90
Days.- As an IAM User:
- Click on
Make Inactive
orDelete
for keys which have not been rotated or used in90
Days.- Click on
Create Access Key
.- Update programmatic call with new Access Key credentials.
From Command Lineβ
- While the first access key is still active, create a second access key, which is active by default. Run the following command:
aws iam create-access-key
At this point, the user has two active access keys.
- Update all applications and tools to use the new access key.
- Determine whether the first access key is still in use by using this command:
aws iam get-access-key-last-used
- One approach is to wait several days and then check the old access key for any use before proceeding.
... see more