Control: AWS > HIPAA > IAM > IAM user credentials that have not been used in 90 days should be disabled
AWS Identity and Access Management (IAM) can help you with access permissions and authorizations by checking for IAM passwords and access keys that are not used for a specified time period.
Resource Types
This control targets the following resource types:
Category
In Your Workspace
Developers
- tmod:@turbot/aws-hipaa#/control/types/iamUserUnusedCredentials90
- tmod:@turbot/turbot#/control/categories/complianceHipaa
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-hipaa#/control/types/iamUserUnusedCredentials90"
Get Controls
Control Type URI
Category URI
GraphQL
CLI