Checks whether the period between the time when an AccessKey pair of a RAM user was created and the time when the compliance evaluation starts is shorter than or equal to the period specified by the input parameter.

Scenario

An AccessKey pair may be disclosed in code, configuration files, or cloud storage files, and thus stolen by an attacker. Regular rotation of AccessKey pairs reduces the business losses if an AccessKey pair is leaked.

Risk level

Default risk level: high.

You can change the risk level as required when you apply this rule.

Compliance evaluation logic

  • If the period between the time when an AccessKey pair of a RAM user was created and the time when the compliance evaluation starts is shorter than or equal to the period specified by the input parameter, the evaluation result is compliant.
  • If the period between the time when an AccessKey pair of a RAM user was created and the time when the compliance evaluation starts is longer than the period specified by the input parameter, the evaluation result is non-compliant. For more information about how to correct the non-compliant configuration, see Non-compliance remediation.

Rule details

Item Description
Rule name ram-user-ak-create-date-expired-check
Rule ID ram-user-ak-create-date-expired-check
Tag RAM and User
Automatic remediation Not supported
Trigger type Periodic execution
Time interval 24 hours
Supported resource type RAM user
Input parameter days. Default value: 90.

Non-compliance remediation

Rotate the AccessKey pairs of the RAM user. For more information, see Rotate AccessKey pairs.