IAM misconfigurations

Unused role with policy found

Risk Level

Informational (4)

Compliance Frameworks


AWS IAM roles can grant access to AWS resources or actions. It is recommended that all roles that have been unused in 90 or greater days be deactivated or removed.
  • Recommended Mitigation

    Unused {AwsIamRole} role should be removed.