This set of CloudFormation templates and Python scripts will set up an auto-rotation function that will automatically rotate your AWS IAM User Access Keys every 90 days.
For testing purpose, I have set up the Rotation period to 1 (one) - leaving everything else as default (inactive period, deletion period, etc)
For my surprise it deleted the Access keys of User instead of Rotating it. I tried again and same thing happened. Instead of rotating it deleted the user's key when rotation period was set to 1.
For testing purpose, I have set up the Rotation period to 1 (one) - leaving everything else as default (inactive period, deletion period, etc)
For my surprise it deleted the Access keys of User instead of Rotating it. I tried again and same thing happened. Instead of rotating it deleted the user's key when rotation period was set to 1.