Posted On: Apr 22, 2015

AWS Identity and Access Management (IAM) now reports the time stamp when access keys, for an IAM user or root account, were last used along with the region and the AWS service that was accessed. These details complement password last used data to provide a more thorough picture of when an IAM user or root account was last active, enabling you to rotate old keys and remove inactive users with greater confidence. You can view access key last used data interactively in the IAM console, programmatically via the API/CLI/SDK, or in the contents of an IAM credential report.