UNKNOWN
Source
CloudSploit
ID
iam-role-last-used

IAM Role Last Used

Ensures IAM roles that have not been used within the given time frame are deleted.

IAM roles that have not been used for a long period may contain old access policies that could allow unintended access to resources if accidentally attached to new services. These roles should be deleted.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log in to the AWS Management Console.

  2. Select the “Services” option and search for IAM. Step

  3. Scroll down the left navigation panel and choose “Roles”. Step

  4. On the “Roles” page, scroll down and check the “Last Activity” column to verify when the IAM Roles are last used.Step

  5. For any Roles with the attribute “None” in the “Last Activity”, click on the Role and check the Creation time.Step

  6. Repeat steps 2 - 4 to verify IAM Roles in other AWS account.

  7. Navigate to IAM dashboard at https://console.aws.amazon.com/iam/.

  8. In the “IAM dashboard”, click on the “Roles” option at the left navigation panel.Step

  9. Select the roles whose “Last Activity” is greater then 90 days or whose Creation time is greater then 90 days but showing None in Last Activity.Step

  10. Click on the “Delete” option at the top to remove the selected IAM roles.Step

  11. On the “Delete role” tab, click on the “Yes, delete” button to make the changes.Step

  12. Repeat steps number 7 - 11 to delete IAM roles that have not been used within the expected time frame.