How to resolve Sprinto check for rotating the older IAM user access keys
About:
Sprinto check: Enabled IAM User Access Keys are not older than 90 days
The above-mentioned Sprinto check verifies that all enabled AWS Identity and Access Management (IAM) user access keys are updated within 90 days from generation. Access keys are used to securely access AWS services and resources programmatically.
Purpose:
The purpose of this check is to enforce regular rotation of IAM user access keys, which is a security best practice. By rotating access keys regularly, you can mitigate the risk of key compromise or misuse, as it reduces the potential window of exposure for any compromised keys. This practice helps maintain the confidentiality and integrity of your AWS resources and reduces the potential impact of a security breach.
How to fix this check:
Follow the below steps to resolve this check:
Before you begin
Ensure you have administrator privilege to manage AWS IAM user access keys.
Rotating IAM User Access Keys
Follow the below steps to rotate the older IAM user access keys:
Log in to AWS Console using your credentials.
Navigate to the AWS IAM service.
Click on Users under Access Management from the left-side navigation bar.
Select the user for which you wish to check the access key timeline.
Select the Security credentials tab, and review the Created column under the Access keys section.
Click Deactivate under the Actions menu if the access key is over 90 days.
Click on Create Access Key to create a new access key. Test the newly generated key by accessing the services accessed by the deactivated key.
Repeat steps 4 to 7 for each IAM user access key on your AWS account.
Sprinto will detect the configuration change and set the check status to "Passing.”
Contact Sprinto support if you have any queries regarding the check or need assistance.