๐ก๏ธ AWS IAM User has no active credentials๐ข
- Contextual name: ๐ก๏ธ User has no active credentials๐ข
- ID:
/ce/ca/aws/iam/user-unused - Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
BEST_PRACTICE - Policy Categories:
SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Similar Policiesโ
- Cloud Conformity: Unused IAM User
Descriptionโ
Descriptionโ
Identify AWS IAM users that exist in the account but do not have an enabled console password and do not have any active programmatic access keys.
Rationaleโ
Although IAM users without active credentials cannot currently be used to access AWS resources, their continued presence introduces several risks:
- Administrative Overhead: These users add unnecessary clutter to the IAM console, credential reports, and access reviews.
- Permission Creep: If such users remain members of IAM groups or have inline policies attached, those permissions could become immediately effective if a password or access key is later created.
- Security Blind Spots: Dormant accounts are rarely monitored. An attacker with
iam:CreateAccessKeypermissions could exploit these users to establish persistence without triggering alerts for an active human user.Auditโ
This policy marks an AWS IAM User as
INCOMPLIANTif all of the followingCred Report Attributesare set to false:
- password_enabled
- access_key_1_active
... see more
Remediationโ
Remediationโ
Remove Unused IAM Usersโ
Remove IAM users that do not have an enabled console password or active programmatic access keys to reduce administrative overhead and minimize the identity attack surface.
From Consoleโ
- Sign in to the AWS Management Console.
- Navigate to the IAM service.
- In the left navigation pane, choose Users.
- Select the IAM user you want to remove (refer to the Audit section to identify applicable users).
- From the User actions dropdown menu, select Delete user.
- In the Delete user dialog, review the associated resources and confirm by selecting Yes, delete.
- Repeat steps 4โ6 for each unused IAM user in the account.
From Command Lineโ
Run the
delete-usercommand to remove a specified IAM user:aws iam delete-user \
--user-name {{user-name}}
policy.yamlโ
Linked Framework Sectionsโ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| ๐ผ AWS Well-Architected โ ๐ผ SEC03-BP06 Manage access based on lifecycle | 2 | no data | |||
| ๐ผ Cloudaware Framework โ ๐ผ Credential Lifecycle Management | 23 | no data |