AWS IAM user password hasn't been used for at least 90 days Affecting IAM service in AWS


Severity

0.0
medium
0
10
Severity Framework
Snyk CCSS
Rule category
IAM/ Authentication

Is your environment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
Frameworks
AWS-Well-ArchitectedCIS-AWSCIS-ControlsCSA-CCMHIPAAISO-27001PCI-DSSSOC-2
  • Snyk IDSNYK-CC-00130
  • creditSnyk Research Team

Description

AWS IAM user passwords unused for 90 days or more should be disabled. It is recommended that all credentials that have not been used in 90 or more days be removed or deactivated.

How to fix?

Remove unused aws_iam_user_login_profile from your Terraform configuration and run terraform apply.