Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: IAM User Access Keys Rotation Every 90 Days

Ensure IAM user access keys are rotated every 90 days for security compliance.

RuleIAM user access keys should be rotated at least every 90 days
FrameworkNIST 800-53 Revision 4
Severity
Low

Rule Description:

IAM user access keys should be rotated at least every 90 days to comply with NIST 800-53 Revision 4. Regularly rotating access keys helps to reduce the risk of unauthorized access and potential security breaches.

Troubleshooting Steps:

  1. 1.
    Identify IAM users who have active access keys.
  2. 2.
    Check the creation date of each access key.
  3. 3.
    Determine if any access keys have not been rotated within the last 90 days.
  4. 4.
    Notify users whose access keys are due for rotation.

Necessary Codes:

No specific code is required for this rule. It can be enforced using AWS Identity and Access Management (IAM) policies and configurations.

Remediation Steps:

  1. 1.

    Identify IAM users with access keys older than 90 days.

    • Run the following AWS CLI command to list IAM users with their access key ages:
      aws iam list-users --query 'Users[].{UserName:UserName}' --output table
      
  2. 2.

    Notify users whose access keys need rotation.

    • Send an email or notification to affected users with instructions to rotate their access keys.
  3. 3.

    Rotate access keys for each user.

    • Each user must perform the following steps to rotate their access keys:
      • Sign in to the AWS Management Console with their IAM user credentials.
      • Open the IAM console.
      • Click on "Users" in the left navigation pane.
      • Select the user whose access key needs rotation.
      • Go to the "Security credentials" tab.
      • Expand the "Access Keys" section.
      • Click on "Create access key" if the user has no existing access keys.
      • If the user has existing access keys, click on the "Make inactive" button next to the old access key.
      • Click on "Create access key" to generate a new access key.
      • Finally, the user should update their applications or services to use the new access key.
  4. 4.

    Periodically monitor access key age and rotation compliance.

    • Regularly review access key ages to ensure compliance with the 90-day rotation policy.
    • Rerun the AWS CLI command in step 1 to check for any non-compliant access keys.

Additional Notes:

  • Automating access key rotation can help ensure compliance with this policy. AWS provides services like AWS Secrets Manager or AWS Lambda that can be used to automate the rotation process.
  • It is recommended to enforce multi-factor authentication (MFA) for IAM users as an additional security measure.
  • Regularly monitoring and auditing IAM access keys helps to maintain a secure access control system.

Is your System Free of Underlying Vulnerabilities?
Find Out Now