This rule mandates rotating IAM user access keys every 90 days to enhance security measures.
Rule | IAM user access keys should be rotated at least every 90 days |
Framework | GxP 21 CFR Part 11 |
Severity | ✔ Low |
IAM User Access Key Rotation Policy for GxP 21 CFR Part 11 Compliance
Rule Description
In order to comply with the GxP (Good Practices) regulations of 21 CFR Part 11, it is essential to regularly rotate the access keys of IAM (Identity and Access Management) users. This policy ensures that access keys are regularly updated, reducing the risk of unauthorized access to sensitive data and systems.
Troubleshooting Steps
In case of any issues or errors encountered during IAM user access key rotation, follow these troubleshooting steps:
Code Examples (if applicable)
There are multiple methods to rotate IAM user access keys using the AWS CLI or AWS Management Console. Here are a few examples:
CLI Command for Manual Access Key Rotation
To manually rotate an IAM user's access key using the AWS CLI, follow these steps:
aws iam list-users
aws iam create-access-key --user-name <IAM_USERNAME>
aws iam delete-access-key --access-key-id <ACCESS_KEY_ID> --user-name <IAM_USERNAME>
Automated Access Key Rotation using AWS Lambda
This example demonstrates using the AWS Lambda service to automatically rotate IAM user access keys.
Remediation Steps
To ensure compliance with the IAM user access key rotation policy for GxP 21 CFR Part 11, follow these step-by-step remediation instructions:
By adhering to this policy, you can ensure proper access key management for IAM users in accordance with GxP 21 CFR Part 11 regulations.