Mods
AWS

Policy: AWS > CIS v1.4 > 1 - Identity and Access Management > 1.12 - Ensure credentials unused for 45 days or greater are disabled (Automated)

Configures auditing against a CIS Benchmark item.

Level: 1 (Scored)

AWS IAM users can access AWS resources using different types of credentials, such as passwords or access keys. It is recommended that all credentials that have been unused in 45 or greater days be deactivated or removed.

Resource Types

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Controls

Policy Specification

Schema Type
string
Default
Per AWS > CIS v1.4 > 1 - Identity and Access Management
Valid Values [YAML]
  • Per AWS > CIS v1.4 > 1 - Identity and Access Management
    
  • Skip
    
  • Check: Level 1 (Scored)
    

Category

In Your Workspace

Developers