logo

Database

Aws Old Credentials Enabled

Description

Detects AWS IAM users who have password-based authentication enabled but haven't used their credentials in the last 90 days. Inactive accounts with valid credentials present a security risk as they may be compromised without detection.

Weakness:

277 - Weak credential policy - Password Expiration

Category: Probabilistic Techniques

Detection Strategy

    Examines the AWS IAM credential report for all users in the account

    Checks if users have password-based authentication enabled

    For users with passwords enabled, verifies when the password was last used

    Reports a vulnerability if the password hasn't been used in the last 90 days

    Each vulnerability includes the user's ARN and the timestamp of their last password usage