IAM roles with policies attached should be used within the last 90 days

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Description

Ensuring IAM roles are actively used within the last 90 days helps maintain a secure AWS environment. Inactive roles with policies attached can pose security risks, such as outdated permissions lingering in the system, which can be exploited for unauthorized access.

Remediation

From the console

For detailed steps on managing IAM roles, refer to the IAM Roles documentation.

PREVIEWING: rtrieu/product-analytics-ui-changes