Expired IAM Access Keys (90 Days)

Sends a report if your IAM user access keys are not changed in the past 90 days. Rotating the keys minimises the chance of malicious users gaining access to your account.

Adopt Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs daily

Resource

Select resources on which you want to work on.

Gets Users in a specific AWS Region for IAM service. Also inject data from IAM Access Keys

Filter

Enter parameters to filter resources in the workflow.

Filters the data

Report

Use this node to generate advanced reports

Generates the report and sends it via Slack or email
Adopt Template

Workflow Template

Trigger

Use this to initiate a workflow based on time, events or call.

Runs daily

Resource

Select resources on which you want to work on.

Gets Users in a specific AWS Region for IAM service. Also inject data from IAM Access Keys

Filter

Enter parameters to filter resources in the workflow.

Filters the data

Report

Use this node to generate advanced reports

Generates the report and sends it via Slack or email

Create A Template

Thank you! Your submission has been received!
Oops! Something went wrong while submitting. Please Try Again.

Request for a template

You can publish templates created by you on this platform.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Similar Templates

CloudFront distributions

CloudFront
None

CloudFront distributions (Inventory)

AutoScaling Groups

None
AWS Auto Scaling

AutoScaling Groups (Inventory)

Route53 hosted zones

None

Route53 hosted zones (Inventory)

ElastiCache Clusters

None
ElastiCache

ElastiCache Clusters (Inventory)