Steampipe MCP Server →
Steampipe Hub 
Hub
  • Plugins
  • Mods
  • Docs
  • Home
PluginsModsDocsHome
Plugins
turbot/aws
GitHub Repo Stars
Overview
571
Tables
2,981
Queries
PowerpipeModsGitHub
steampipe plugin install awssteampipe plugin install aws
Get Involved
Edit on GitHubDiscuss on Slack

Query: Ensure credentials unused for 45 days or greater are disabled

Description

AWS IAM users can access AWS resources using different types of credentials, such as passwords or access keys. It is recommended that all credentials that have been unused in 45 or greater days be deactivated or removed.

Query

Tables used in this query:

  • aws_iam_credential_report

Controls using this query:

  • 1.11 Ensure credentials unused for 45 days or more are disabled
  • 1.12 Ensure credentials unused for 45 days or greater are disabled
  • 1.12 Ensure credentials unused for 45 days or greater are disabled
  • 1.12 Ensure credentials unused for 45 days or greater are disabled
  • 1.12 Ensure credentials unused for 45 days or greater are disabled
  • 1.12 Ensure credentials unused for 45 days or more are disabled
  • 2.11 Ensure credentials unused for 45 days or more are disabled
  • Ensure credentials unused for 45 days or greater are disabled

SQL

Steampipe
Steampipe
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of 3,000+ practitioners love to discuss Steampipe, cloud intelligence & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy