- 필수 기능
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- 디지털 경험
- 소프트웨어 제공
- 보안
- 로그 관리
- 관리
- 인프라스트럭처
- ci
- containers
- csm
- ndm
- otel_guides
- overview
- slos
- synthetics
- tests
- 워크플로
This rule identifies IAM access keys that are older than one year and have not been used in the past 30 days.
This is a good indicator that an access key or IAM user that is not used anymore, and raises a security risk. IAM access keys are static secrets that do not change. This leak represents a common cause for cloud security breaches.
Follow the Rotating IAM user access keys (console) AWS documentation to rotate access keys.
Follow the Rotating IAM user access keys (AWS CLI) AWS documentation to rotate access keys.