We have IAM user(programmatic access only) with access key age more than 4 years. S3 and SQS are the only services actively being used by this user. We want to rotate the access key by creating a new user/policy.
I created a new user added it to the groups the old user is in and given the same policies. I can see last-activity as "None" which means services are not using this user. I also created a new access key for first user and last activity is none for that. Can some help me what I've to do let all the applications use this new access key instead of old one, so that I can delete it.
Policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "*",
"Resource": "*"
},
{
"Effect": "Deny",
"Action": [
"aws-portal:*",
"iam:*"
],
"Resource": "*"
}
]
}