Mods
AWS

Policy: AWS > CIS v3.0 > 1 - Identity and Access Management > 1.12 - Ensure credentials unused for 45 days or greater are disabled

Configures auditing against a CIS Benchmark item.

Level: 1

AWS IAM users can access AWS resources using different types of credentials, such as passwords or access keys. It is recommended that all credentials that have been unused in 45 or greater days be deactivated or removed.

Resource Types

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Controls

Policy Specification

Schema Type
string
Default
Per AWS > CIS v3.0 > 1 - Identity and Access Management
Valid Values [YAML]
  • Per AWS > CIS v3.0 > 1 - Identity and Access Management
    
  • Skip
    
  • Check: Benchmark
    

Category

In Your Workspace

Developers