agent: |
VmKKYc9FfzDBqCA76JTfIdentify AWS IAM users with passwords or access keys that have not been used in the last 90 days.
Identify AWS IAM users with passwords or access keys that have not been used in the last 90 days.
There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.
Identifies AWS IAM users with passwords or access keys not used in the last 90 days and lists them as non-compliant.
inputs
outputs
from datetime import datetime, timedelta, timezone
import json
# Calculate the threshold date
threshold_date = datetime.now(timezone.utc) - timedelta(days=days_threshold)
non_compliant_users = []
for user in users_last_used_info:
password_last_used = user['PasswordLastUsed']
access_key_last_used = user['AccessKeyLastUsed']
# Check password last used
if password_last_used != "Never":
password_last_used_date = datetime.fromisoformat(password_last_used)
if password_last_used_date < threshold_date:
non_compliant_users.append(user['UserName'])
continue
# Check access key last used
if access_key_last_used != "Never":
access_key_last_used_date = datetime.fromisoformat(access_key_last_used)
if access_key_last_used_date < threshold_date:
non_compliant_users.append(user['UserName'])
print(json.dumps(non_compliant_users, indent=4))
copied