Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 300+ predefined templates to automate all your AWS actions

Create Template
Solutions
All Categories

IAM

24 Times Used
22 MAY 2019
Ensure IAM password policy require expire passwords within 90 days - fix
IAM
Operational Excellence

Template will update the pwd policy with 90 days expiry of you IAM user passwords

Ensure IAM password policy require at least one symbol
IAM
CIS-AWS

Checks if IAM password policy require at least one symbol

Ensure IAM password policy require uppercase letter - fix
IAM
Operational Excellence

.

IAM Users - Admin Access and MFA Check
IAM
Security
Security
CIS-AWS

Sends a report of IAM users which have Admin access. Administrator access should be given to trusted users only.

Ensure IAM password policy require expire passwords within 90 days
IAM
CIS-AWS

Checks if IAM password policy require expire passwords within 90 days

Ensure a log metric filter and alarm exist for VPC changes
IAM
CIS-AWS

Checks if a log metric filter and alarm exist for VPC changes

Expired IAM Access Keys (90 Days)
IAM
CIS-AWS

Ensure credentials unused for 90 days or greater are disabled

Ensure IAM password policy prevents password reuse
CIS-AWS
IAM

Checks if IAM password policy prevents password reuse

Ensure IAM password policy require at least one number
CIS-AWS
IAM

Checks if IAM password policy require at least one number

Ensure IAM password policy require min length of 14
CIS-AWS
IAM

Checks if IAM password policy require min length of 14

Ensure IAM password policy require min length of 14 - fix
IAM
Operational Excellence

.

IAM Users with Unused Console Credentials
CIS-AWS
IAM

Ensure console credentials are rotated every 90 days or less

Ensure IAM password policy require at lowerCase letter
IAM
CIS-AWS

Checks if IAM password policy require lowerCase letter

Ensure IAM password policy require uppercase letter
CIS-AWS
IAM

Checks if IAM password policy require uppercase letter

Expired IAM Access Keys (90 Days)
IAM
Security
Security

Sends a report if your IAM user access keys are not changed in the past 90 days. Rotating the keys minimises the chance of malicious users gaining access to your account.