Process

Rotate IAM access keys

Rotate IAM access keys where IAM users are still required

Summary

In the situations where IAM users are still required, or for existing IAM users that haven not/can not be migrated to IAM roles, access keys should be rotated where applicable. The frequency of key rotation may vary depending on your specific security requirements and the level of risk associated with your application or infrastructure, but general guidance is to rotate when existing keys are 90 days old. Regularly rotating access keys is important in maintaining the security of your infrastructure. This practice limits the amount of time that an exposed key is valid for.

Applicable To

To IAM users

Resources

IAM Users

Maturity

Functions
Security
CSPS

AWS

Author

Adam Cotenoff

Back to Home