- Home
- »
- AWS Documentation
- »
- IAM
- »
- Ensure access keys are rotated every 90 days or less
Access keys are not rotated every 90 days or less
Description
Access keys are composed of an access key ID and a secret access key. These are utilized to authenticate and sign programmatic requests sent to AWS services. AWS users must have their own access keys in order to initiate programmatic interactions with AWS, whether through the AWS Command Line Interface (AWS CLI), AWS Tools for Windows PowerShell, AWS SDKs, or by making direct HTTP requests via the APIs of individual AWS services.
It is recommended to implement regular rotation of all access keys to mitigate the risk of unauthorized access resulting from outdated, lost, or compromised keys associated with active or terminated accounts.
Fix - Runtime
AWS Console
To manually rotate access keys using the AWS Console, follow these steps:
- Log in to the AWS Management Console at https://console.aws.amazon.com/.
- Navigate to IAM Services.
- Select Users.
- Select Security Credentials.
- As an Administrator: select Make Inactive for keys that have not been rotated in 90 Days or as an IAM User select Make Inactive or Delete for keys which have not been rotated or used in 90 Days.
- Select Create Access Key.
- Update programmatic call with new Access Key credentials.
CLI Command
To change the password policy, use the following command:
aws iam update-access-key
aws iam create-access-key
aws iam delete-access-key