You might have IAM users, roles, and permissions that you no longer require in your AWS account. We recommend that you remove them with the goal of achieving least-privilege access. For IAM users, you can review password and access key last used information. For roles, you can review role last used information. This information is available through the IAM console, APIs, and SDKs. Last used information helps you identify users and roles that are no longer in use and safe to remove. You can also refine permissions by reviewing service and last accessed information to identify unused permissions. For more information, see Refine permissions in AWS using last accessed information.
If you enable an unused access analyzer as a paid feature, IAM Access Analyzer continuously analyzes your accounts to identify unused access and creates a centralized dashboard with findings. Security teams can use the dashboard to review findings and prioritize which accounts to review based on the volume of findings, which highlight unused roles, unused access keys for IAM users, and unused passwords for IAM users. For active IAM roles and users, the findings provide visibility into unused services and actions, simplifying the inspection of unused access to guide you toward least privilege. With this feature, you pay per IAM role or IAM user analyzed per month.