Developers are using IAM access keys to manage AWS resources using AWS CLI. Company policy requires that access keys are automatically disabled when the access key age is greater than 90 days. Which solution will accomplish this?
A.
Configure an Amazon CloudWatch alarm to trigger an AWS Lambda function that disables keys older than 90 days.
B.
Configure AWS Trusted Advisor to identify and disable keys older than 90 days.
C.
Set a password policy on the account with a 90-day expiration.
D.
Use an AWS Config rule to identify noncompliant keys. Create a custom AWS Systems Manager Automation document for remediation.
password policy is for "password", not access keys.
"The IAM password policy does not apply to the AWS account root user password or IAM user access keys."
Ref.: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_account-policy.html#IAMPasswordPolicy
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Drey
Highly Voted 1 year, 1 month agoFinger41
Most Recent 4 months, 3 weeks agoCyril_the_Squirl
11 months, 3 weeks agoHuy
1 year agofromnowhere
5 months, 4 weeks agoZL23
1 year agoRicardoD
1 year ago