AWS-IAM-IAM-Role-Last-Used
Severity : Medium
Description: This control ensures that all IAM roles are used recently and there are no unused roles for for more than 90 days. Removing the unused roles improve the security posture of AWS environments. Additionally, removing unused roles simplify monitoring and auditing efforts by focusing only on roles that are in use. Besides, these roles may have access policies that may allow unintended access to resources to malicious actor.
Remediation Steps:
Perform following to update IAM policy for IAM user :
Login to the AWS Management Console at https://console.aws.amazon.com.
Navigate to IAMÂ console.
On the Left Pane, click on Roles.
Check the checkbox of roles reported.
Select Delete. In the confirm dialog box, Under confirm deletion enter name of the role.
Select Delete.
Important:
Any application or user may see failure if they try to use the deleted role.
Reference:
Â
Blue Hexagon Proprietary