This rule states that IAM user access keys should be rotated at least every 90 days.
Rule | IAM user access keys should be rotated at least every 90 days |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
IAM User Access Key Rotation - NIST 800-53 Revision 5
Description
To ensure the security and integrity of user accounts, it is recommended to rotate IAM user access keys periodically. The National Institute of Standards and Technology (NIST) 800-53 Revision 5 guidelines recommend rotating access keys at least every 90 days.
Access keys provide programmatic access to AWS services and resources. Regularly rotating these keys reduces the risk associated with compromised or leaked keys, as well as potential unauthorized access to your resources.
Troubleshooting Steps
If you encounter any issues during the access key rotation process, follow these troubleshooting steps:
Necessary Codes
No specific code block is required for access key rotation, as it can be done through the AWS Management Console or CLI commands.
Step-by-Step Guide for Access Key Rotation
Follow these steps to rotate IAM user access keys:
Sign in to the AWS Management Console using an IAM user with appropriate administrative permissions.
Navigate to the IAM service.
Select "Users" from the left-hand menu.
Locate the user whose access keys need to be rotated and click on their username.
In the "Security credentials" tab, locate the "Access keys" section.
Identify the access key that needs to be rotated. It will have an "Active" status.
Click on the access key ID of the key to proceed with the rotation process.
Click "Rotate access key" from the top-right corner of the Overview tab.
A confirmation prompt will appear. Click "Rotate" to proceed.
The old access key will now be marked as inactive, and a new access key pair will be created.
Make note of the new access key ID and secret access key, as they will be needed for programmatic access to AWS services.
Update any systems, applications, or scripts that utilize the IAM user's access keys with the newly generated key pair.
Test the updated configurations to ensure they are functioning correctly.
Once everything is confirmed to be working as expected, delete the retired access key from the "Security credentials" tab to reduce the attack surface.
Conclusion
Rotating IAM user access keys periodically is an essential security practice to mitigate the risks associated with compromised or leaked keys. Following this guideline ensures compliance with NIST 800-53 Revision 5 recommendations and enhances the overall security posture of your AWS environment.