Detects users with password logins that have not been used
Having numerous, unused user accounts extends the attack surface.
Follow the appropriate remediation steps below to resolve the issue.
Log into the AWS Management Console.
Select the “Services” option and search for IAM.
Scroll down the left navigation panel and choose “Users”.
Select the “User” that needs to be verified and click on the “User name” to access the selected “IAM User”.
Click on the “Security Credentials” under the configuration page.
Scroll down the “Security Credentials” tab and check the “Console password”.Check the “Console password” section for “last signed in”. If “last signed in” is showing for the period more than 180 days than the password is not been used for a period of time.
Repeat steps number 2 - 6 to verify for other IAM users.
Go to the “Users” page and select the “User” whose password is not been used for a period of time now.
Click on the “Delete user” button at the top to delete the selected user.
On the “Delete user” tab click on the “Yes, delete” button to delete the selected IAM user.
Repeat steps number 8 - 10 to delete the other IAM users whose passwords are not used for a period of time.