Access keys are not rotated every 30 days or less

Description

To minimize the risk of accidental exposure and protect AWS resources from unauthorized access, IAM access keys should be regularly rotated.

Recommendation:
Access keys for IAM accounts should be rotated at least every 30 days, or more frequently if feasible, to ensure continuous protection and reduce the window of opportunity for potential compromise.

Fix - Runtime

AWS Console​

To rotate access keys, follow these steps:

  1. Log in to the AWS Management Console at https://console.aws.amazon.com/.
  2. Navigate to IAM users, and select the relevant user.
  3. If the user has two active access keys, deactivate and then delete one of them. If the user has two keys and one of them is deactivated, then delete it.
  4. Create a new access key. You should now have two active access keys.
  5. Deactivate the old access key.

Mac users can also use this tool: https://github.com/Fullscreen/aws-rotate-key.

ReLambda