Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 300+ predefined templates to automate all your AWS actions

Create Template
Solutions
All Categories

IAM

24 Times Used
22 MAY 2019
IAM Users - Admin Access and MFA Check
IAM
Security
Security
CIS-AWS

Sends a report of IAM users which have Admin access. Administrator access should be given to trusted users only.

Ensure IAM password policy require expire passwords within 90 days
IAM
CIS-AWS

Checks if IAM password policy require expire passwords within 90 days

Ensure a log metric filter and alarm exist for VPC changes
IAM
CIS-AWS

Checks if a log metric filter and alarm exist for VPC changes

Expired IAM Access Keys (90 Days)
IAM
CIS-AWS

Ensure credentials unused for 90 days or greater are disabled

Ensure IAM password policy prevents password reuse
CIS-AWS
IAM

Checks if IAM password policy prevents password reuse

Ensure IAM password policy require at least one number
CIS-AWS
IAM

Checks if IAM password policy require at least one number

Ensure IAM password policy require min length of 14
CIS-AWS
IAM

Checks if IAM password policy require min length of 14

Ensure IAM password policy require min length of 14 - fix
IAM
Operational Excellence

.

IAM Users with Unused Console Credentials
CIS-AWS
IAM

Ensure console credentials are rotated every 90 days or less

Ensure IAM password policy require at lowerCase letter
IAM
CIS-AWS

Checks if IAM password policy require lowerCase letter

Ensure IAM password policy require uppercase letter
CIS-AWS
IAM

Checks if IAM password policy require uppercase letter

Expired IAM Access Keys (90 Days)
IAM
Security
Security

Sends a report if your IAM user access keys are not changed in the past 90 days. Rotating the keys minimises the chance of malicious users gaining access to your account.

IAM Users with Unused Console Credentials
IAM
Operational Excellence
Operational Excellence

Send report of IAM users whose Password is enabled but has not been used from past 90 days. These users are considered as unused IAM users and can be safely removed from your AWS account

Ensure IAM password policy require expire passwords within 90 days
IAM
CIS-AWS

Checks if IAM password policy require expire passwords within 90 days

Ensure IAM password policy require at least one symbol
IAM
CIS-AWS

Checks if IAM password policy require at least one symbol