If no leaked AccessKey pairs are detected in the Security Center console, the evaluation result is Compliant.

Scenarios

Leakage of AccessKey pairs exposes cloud systems and resources to high security risks.

Risk level

Default risk level: high.

When you apply this rule, you can change the risk level based on your business requirements.

Compliance evaluation logic

  • If no leaked AccessKey pairs are detected in the Security Center console, the evaluation result is Compliant.
  • If a leaked AccessKey pair is detected in the Security Center console, the evaluation result is Incompliant. For more information about how to remediate an incompliant configuration, see the "Incompliance remediation" section of this topic.

Rule details

ItemDescription
Rule namesecurity-center-leak-ak-check
Rule identifiersecurity-center-leak-ak-check
TagSecurityCenter
Automatic remediationNot supported
Trigger typePeriodic execution
Evaluation frequencyInterval of 24 hours
Supported resource typeAll resources
Input parameterNone

Incompliance remediation

Make sure that no AccessKey pairs are leaked. For more information, see Detection of AccessKey pair leaks.