IAM roles should be used within the last 90 days

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Description

Ensuring IAM roles are actively used within the last 90 days helps maintain a secure AWS environment. Inactive roles can pose security risks, such as outdated permissions lingering in the system, which can be exploited for unauthorized access.

Remediation

From the console

For detailed steps on managing IAM roles, refer to the IAM Roles documentation.

PREVIEWING: safchain/fix-custom-agent