IAM SSH public keys should be rotated at least every 90 days

Description

This control verifies if an IAM user’s SSH public keys are being rotated at least every 90 days.

Regular rotation of SSH public keys mitigates risks associated with key compromise, ensuring tighter access control and enhanced security. Implementing a key rotation policy helps in maintaining the integrity and confidentiality of your systems.

Remediation

To implement a regular SSH public key rotation policy for IAM users, refer to the relevant guidance in the AWS IAM User Guide for best practices on credential management and rotation.

PREVIEWING: esther/docs-9478-fix-split-after-example