If no leaked AccessKey pairs are detected in the Security Center console, the evaluation result is Compliant.
Scenarios
Leakage of AccessKey pairs exposes cloud systems and resources to high security risks.
Risk level
Default risk level: high.
When you apply this rule, you can change the risk level based on your business requirements.
Compliance evaluation logic
- If no leaked AccessKey pairs are detected in the Security Center console, the evaluation result is Compliant.
- If a leaked AccessKey pair is detected in the Security Center console, the evaluation result is Incompliant. For more information about how to remediate an incompliant configuration, see the "Incompliance remediation" section of this topic.
Rule details
Item | Description |
---|---|
Rule name | security-center-leak-ak-check |
Rule identifier | security-center-leak-ak-check |
Tag | SecurityCenter |
Automatic remediation | Not supported |
Trigger type | Periodic execution |
Evaluation frequency | Interval of 24 hours |
Supported resource type | All resources |
Input parameter | None |
Incompliance remediation
Make sure that no AccessKey pairs are leaked. For more information, see Detection of AccessKey pair leaks.