generated from ministryofjustice/template-repository
-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automation to delete unused access keys for Platform users #1894
Labels
Comments
This issue is stale because it has been open 90 days with no activity. |
This issue is stale because it has been open 90 days with no activity. |
IAM only ? what about admin users where we wouldn't normally log on |
@davidkelliott we need to know the above answer. Thanks! |
dms1981
changed the title
Automation to remove or deactivate unused IAM accounts
Automation to delete unused access keys for Platform users
May 9, 2024
4 tasks
Reopened in mistake, this is implemented already, so closing the issue |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
User Story
As a platform user
I want my access to the platform to be disabled
when I am inactive for longer than X number of months.
User Type(s)
All GitHub users (team members and collaborators)
Value
This is to mitigate the security risk, when a user has access to AWS accounts after they leave an organisation.
Questions / Assumptions / Hypothesis
Proposal
Given that Platform users can create their own keys, inactive keys should be deleted to prevent accidental leakage or unintended use; if we're not using them regularly, then there's no compelling reason to keep them active.
Definition of done
Reference
How to write good user stories
The text was updated successfully, but these errors were encountered: