standard
turbot/aws_compliance

Trigger: Detect & correct expired IAM server certificates

Detects IAM server certificates which are expired and then delete them.

Query

select
(name, ' [', account_id, ']') as title,
name as server_certificate_name,
to_char(expiration, 'DD-Mon-YYYY') as expiration_date,
account_id,
sp_connection_name as conn
from
aws_iam_server_certificate
where
expiration < (current_date - interval '1' second);

Schedule

15m

Tags

category = Compliance
mod = aws
service = AWS/IAM