Unused credentials should be deactivated or removed

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Description

AWS IAM users can access AWS resources using various types of credentials, such as passwords and access keys. Datadog recommends that you deactivate or remove all credentials that are unused for 45 or more days to enhance security.

Disabling or removing unnecessary credentials reduces the window of opportunity for compromised or abandoned accounts to be exploited, enhancing the security posture of the AWS environment.

Remediation

For instructions on managing and deactivating unused IAM credentials, refer to AWS documentation on handling unused credentials.

PREVIEWING: drodriguezhdez/add_public_docs_log_summarization