IAM Users Inactive for Last 30 Days
Overview
The "IAM Users Inactive for Last 30 Days" widget identifies IAM users who have not performed any actions or accessed their AWS account in the last 30 days. Inactive users are often targets for attackers, as they may be overlooked by security monitoring systems.

Why It Matters
For IT Engineers:
Account Management:
Highlights accounts that have not been in use, helping IT teams to either reactivate or deactivate these accounts.
Resource Optimization:
Allows for efficient management of user accounts, ensuring that only necessary accounts are active and consuming resources.
Access Control:
Helps ensure that inactive accounts do not pose a security risk due to lack of monitoring or oversight.
For Security Engineers:
Risk Reduction:
Dormant accounts may be easier targets for exploitation. This widget helps identify and mitigate such risks.
Compliance:
Supports compliance with internal policies or external regulations that require inactive accounts to be deactivated or monitored more closely.
Security Hygiene:
Ensures that inactive accounts are managed and secured to prevent unauthorized access attempts.
Last updated
Was this helpful?