This workflow template provides an automated solution for monitoring AWS Access Keys, detailing the number of keys, their statuses, and usage history. It's essential for Cloud Security Posture Management, ensuring that key usage adheres to security policies by identifying inactive or outdated keys that could pose a security risk. The workflow is triggered on-demand, includes key state information, and caters to more secure AWS account management practices.
Optional Triggers
Webhook,Slack,"Microsoft teams"
Use Cases
CSPM
Workflow Breakdown
List the users access keys
Gather details on each access key for status and calculate hours since creation
If Last Used Data is provided, include in the workflow output.
Vendors
AWS, Utils
Workflow Output
Summary of Access Keys that are assigned to the user and the state of the keys
Tips
Inactivity is calculated based on the workflow variable for inactivity days