Skip to content

Latest commit

 

History

History
28 lines (24 loc) · 2.8 KB

users-password-last-used.md

File metadata and controls

28 lines (24 loc) · 2.8 KB

CloudSploit

AWS / IAM / Users Password Last Used

Quick Info

Plugin Title Users Password Last Used
Cloud AWS
Category IAM
Description Detects users with password logins that have not been used for a period of time and that should be decommissioned
More Info Having numerous, unused user accounts extends the attack surface. If users do not log into their accounts for more than the defined period of time, the account should either be deleted or have console login disabled.
AWS Link http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_admin-change-user.html
Recommended Action Delete old user accounts that allow password-based logins and have not been used recently.

Detailed Remediation Steps

  1. Log in to the AWS Management Console.
  2. Select the "Services" option and search for IAM.
  3. Scroll down the left navigation panel and choose "Credential report". Click on the "Download Report" button to download a report that lists all your account's users and the status of their various credentials.
  4. Open the downloaded credentials report and check the "password_last_used_date" column for each IAM account. If the timestamp value for "password_last_used_date" is recorded within the last 7 days, the above credentials have been used to access the AWS account. If however, the timestamp value is older than 90 days, then the account should be deleted or disabled.
  5. Scroll down the left navigation panel and choose "Users".
  6. Select the "User" that needs to be verified and click on the "User name" to access the selected IAM User.
  7. Click on the "Security Credentials" tab under the configuration page.
  8. Under the "Security Credentials" tab check the "Console password" section for status "Enabled/Disabled". If the status is "Enabled" then the console sign in is enabled and needs to be disabled.
  9. Click on "Manage" to open "Manage console acess" pop up.
  10. Select "Disable" for the Console access and click on "Apply" button.
  11. Repeat step number 2 - 11 to verify for other IAM users.