{ "Categories": [ "cat1", "cat2" ], "CheckAlias": "extra764", "CheckID": "iam_disable_30_days_credentials", "CheckName": "iam_disable_30_days_credentials", "CheckTitle": "Ensure credentials unused for 30 days or greater are disabled", "CheckType": "Software and Configuration Checks", "Compliance": [ { "Control": [ "4.4" ], "Framework": "CIS-AWS", "Group": [ "level1", "level2" ], "Version": "1.4" } ], "DependsOn": [ "othercheck1", "othercheck2" ], "Description": "Ensure credentials unused for 30 days or greater are disabled", "Notes": "additional information", "Provider": "aws", "RelatedTo": [ "othercheck3", "othercheck4" ], "RelatedUrl": "https://serviceofficialsiteorpageforthissubject", "Remediation": { "Code": { "CLI": "cli command or URL to the cli command location.", "NativeIaC": "code or URL to the code location.", "Other": "cli command or URL to the cli command location.", "Terraform": "code or URL to the code location." }, "Recommendation": { "Text": "Run sudo yum update and cross your fingers and toes.", "Url": "https://myfp.com/recommendations/dangerous_things_and_how_to_fix_them.html" } }, "ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id", "ResourceType": "AwsIamAccessAnalyzer", "Risk": "Risk associated.", "ServiceName": "iam", "Severity": "low", "SubServiceName": "accessanalyzer", "Tags": { "Tag1Key": "value", "Tag2Key": "value" } }