Skip to main content

💼 [IAM.8] Unused IAM user credentials should be removed

Description

IAM users can access AWS resources using different types of credentials, such as passwords or access keys.

Similar

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST SP 800-53 Revision 5 → 💼 AC-2 Account Management132034
💼 NIST SP 800-53 Revision 5 → 💼 AC-2(1) Account Management _ Automated System Account Management416
💼 NIST SP 800-53 Revision 5 → 💼 AC-2(3) Account Management _ Disable Accounts14
💼 NIST SP 800-53 Revision 5 → 💼 AC-3 Access Enforcement15537
💼 NIST SP 800-53 Revision 5 → 💼 AC-3(7) Access Enforcement _ Role-based Access Control14
💼 NIST SP 800-53 Revision 5 → 💼 AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control11
💼 NIST SP 800-53 Revision 5 → 💼 AC-6 Least Privilege102349
💼 PCI DSS v3.2.1 → 💼 8.1.4 Remove/disable inactive user accounts within 90 days.1
💼 PCI DSS v4.0.1 → 💼 8.2.6 Inactive user accounts are removed or disabled within 90 days of inactivity.1

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS IAM User with credentials unused for 45 days or more is not disabled 🟢1🟢 x6