MEDIUM
Source
CloudSploit
ID
access-keys-rotation

Access Keys Rotation

Ensure that RAM user access keys are rotated after regular interval of time.

Access keys should be rotated to avoid having them accidentally exposed.

Rotate the access keys every desired number of days