IAM SSH public keys should be rotated at least every 90 days

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Description

This control verifies if an IAM user’s SSH public keys are being rotated at least every 90 days.

Regular rotation of SSH public keys mitigates risks associated with key compromise, ensuring tighter access control and enhanced security. Implementing a key rotation policy helps in maintaining the integrity and confidentiality of your systems.

Remediation

To implement a regular SSH public key rotation policy for IAM users, refer to the relevant guidance in the AWS IAM User Guide for best practices on credential management and rotation.

PREVIEWING: mervebolat/span-id-preprocessing