Unused credentials should be deactivated or removed
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Description
AWS IAM users can access AWS resources using various types of credentials, such as passwords and access keys. Datadog recommends that you deactivate or remove all credentials that are unused for 45 or more days to enhance security.
Disabling or removing unnecessary credentials reduces the window of opportunity for compromised or abandoned accounts to be exploited, enhancing the security posture of the AWS environment.
For instructions on managing and deactivating unused IAM credentials, refer to AWS documentation on handling unused credentials.