More Info:

List of IAM Users which have not been active recently.

Risk Level

Medium

Address

Security

Compliance Standards

CISGCP

Triage and Remediation

Remediation

To remediate inactive IAM users in AWS using the AWS Management Console, follow these steps:

  1. Sign in to the AWS Management Console using your AWS account credentials.
  2. Open the IAM console by searching for “IAM” in the AWS services search bar and selecting “IAM” from the results.
  3. In the left navigation pane, click on “Users” to view the list of IAM users in your account.
  4. Identify the inactive users by looking at the “Last activity” column. Users who have not performed any activity for an extended period are considered inactive.
  5. Select the checkbox next to the inactive user(s) that you want to remediate.
  6. Click on the “Security credentials” tab at the bottom of the user details section.
  7. Under “Access keys,” check if the user has any access keys. If there are any access keys, they should be deleted.
    • To delete an access key, click on the “Delete” button next to the access key.
    • If the user requires access keys, generate new ones after deleting the old keys.
  8. Under “Console password,” check if the user has a password set. If a password is set, it should be reset.
    • To reset the password, click on the “Manage” button next to the console password.
    • Follow the on-screen instructions to set a new password for the user.
  9. Under “Permissions,” review the user’s assigned policies and group memberships.
    • Remove the user from any unnecessary groups or policies.
    • If the user requires specific permissions, ensure they are assigned the appropriate policies.
  10. Click on the “Tags” tab to review any assigned tags. Remove any unnecessary tags.
  11. Once you have reviewed and made the necessary changes for the inactive user(s), click on the “Close” button to save the changes.

By following these steps, you can remediate inactive IAM users in AWS using the AWS Management Console.