@inactiveUser = {
These credentials have not been used in over a year, can they be deleted?
Read more in the AWS docsThis user has a password therefore is assumed to be associated with a human. The following issues may apply:
AWS Multi-Factor Authentication is a simple best practice that adds an extra layer of protection on top of a user name and password
Read more in the AWS docsIt is recommended not to enable username/password and permanent access key(s) on the same IAM user. If this is required then programmatic access should be short-lived or the key should be rotated frequently, every 90 days
Access keys are generally intended for programmatic access, does this user really need them?
This human credential is missing an IAM tag with key "GoogleUsername". The value for this tag should be the same prefix as Guardian email addresses, for example "ada.lovelace" or "ada.lovelace.freelancer". This is important, because Security HQ will use this to disable the credentials of former staff.
This user does not have a password therefore is assumed to be intended for programmatic access. The following issues may apply:
Regular access key rotation is an established security best practice and our policy is to rotate keys for programmatic access at least once a year
This user currently has no way of accessing AWS, is this user still required or can it be deleted?
Read more in the AWS docs