IAM misconfigurations

Unused role with policy found

Risk Level

Informational (4)

Compliance Frameworks


AWS IAM roles can grant access to AWS resources or actions. It is recommended that all roles that have been unused in 90 or greater days be deactivated or removed.
  • Recommended Mitigation

    Unused {AwsIamRole} role should be removed. ## Remediation --- >1. Sign in to the AWS Management Console and open the **[IAM console](https://console.aws.amazon.com/iam/)**. >2. In the navigation pane, choose **Roles**, and then select the check box next to the role name that you want to delete. >3. At the top of the page, choose **Delete**. >4. In the confirmation dialog box, enter the name of the role in the text input field and choose **Delete**.