This rule states that IAM user access keys must be rotated every 90 days to ensure security.
Rule | IAM user access keys should be rotated at least every 90 days |
Framework | GxP 21 CFR Part 11 |
Severity | ✔ Low |
Rule Description
IAM user access keys should be rotated at least every 90 days for GxP 21 CFR Part 11 compliance. This rule ensures that access keys, which are used to authenticate and authorize IAM users in the AWS environment, are regularly updated to enhance security and protect sensitive data within the scope of GxP regulations.
Troubleshooting Steps
Necessary Codes or Configuration
No specific codes or configurations are required for this rule. However, you may need to utilize AWS CLI commands to manage and rotate IAM user access keys.
Remediation Steps
Follow these step-by-step instructions to remediate the issue and rotate IAM user access keys:
aws iam create-access-key --user-name <IAM-USERNAME>
Note: Replace
<IAM-USERNAME>
with the IAM username that requires key rotation.aws iam delete-access-key --user-name <IAM-USERNAME> --access-key-id <OLD-ACCESS-KEY-ID>
Note: Replace
<IAM-USERNAME>
with the IAM username and <OLD-ACCESS-KEY-ID>
with the ID of the old access key that needs to be removed.