Skip to main content

💼 1.3 Ensure credentials unused for 90 days or greater are disabled

  • ID: /frameworks/cis-aws-v1.2.0/01/03

Description​

AWS IAM users can access AWS resources using different types of credentials, such as passwords or access keys. It is recommended that all credentials that have been unused in 90 or greater days be removed or deactivated.

Similar​

  • Sections
    • /frameworks/cis-aws-v1.3.0/01/12
  • Internal
    • ID: dec-c-f2339bad

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v1.3.0 → 💼 1.12 Ensure credentials unused for 90 days or greater are disabledno data

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v1.3.0 → 💼 1.12 Ensure credentials unused for 90 days or greater are disabledno data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance