A config rule that checks whether your AWS Identity and Access Management (IAM) users have passwords or active access keys that have not been used within the specified number of days you provided. Re-evaluating this rule within 4 hours of the first evaluation will have no effect on the results.

 
Items
1
Size
0.7 KB
Missing Parameters
AWSTemplateFormatVersion: '2010-09-09'
Resources:
  ConfigRule:
    Type: 'AWS::Config::ConfigRule'
    Properties:
      ConfigRuleName: iam-user-unused-credentials-check
      Description: >-
        A config rule that checks whether your AWS Identity and Access
        Management (IAM) users have passwords or active access keys that have
        not been used within the specified number of days you provided.
        Re-evaluating this rule within 4 hours of the first eva...
      InputParameters: {}
      Scope:
        ComplianceResourceTypes: []
      Source:
        Owner: AWS
        SourceIdentifier: IAM_USER_UNUSED_CREDENTIALS_CHECK
      MaximumExecutionFrequency: TwentyFour_Hours
Parameters: {}
Metadata: {}
Conditions: {}

Customize Cf Template

Rule Parameters

 
* Required field