More Info:

Any unused IAM user without console access and API access should be removed as an extra security measure for protecting your AWS resources against unapproved access.

Risk Level

Medium

Address

Security

Compliance Standards

CISAWS, CBP, HIPAA, SOC2, ISO27001, HITRUST, NISTCSF, PCIDSS

Triage and Remediation

How to Prevent

To prevent user accounts without any usage in AWS IAM using the AWS Management Console, follow these steps:

  1. Monitor User Activity:

    • Navigate to the IAM Dashboard in the AWS Management Console.
    • Go to the “Access Advisor” tab for each user to review their last accessed services and activities.
    • Regularly check the “Last Activity” column to identify users who have not accessed any services for a specified period.
  2. Set Up CloudWatch Alarms:

    • Create CloudWatch Alarms to monitor IAM user activity.
    • Set up alarms to trigger notifications when there is no activity for a specified period.
    • Use these alarms to identify inactive users promptly.
  3. Enable Logging with CloudTrail:

    • Ensure AWS CloudTrail is enabled to log all IAM user activities.
    • Regularly review CloudTrail logs to identify users with no activity.
    • Use CloudTrail insights to detect unusual inactivity patterns.
  4. Implement IAM Policies:

    • Create and attach IAM policies that enforce regular reviews of user activity.
    • Use policies to mandate the removal or deactivation of users who have not logged in or performed any actions within a specified timeframe.
    • Ensure compliance with these policies through regular audits and reviews.

By following these steps, you can effectively monitor and manage IAM user accounts to ensure that inactive accounts are identified and addressed promptly.

Additional Reading: