In my current work place, AWS Access Keys are deleted after 90 days for human users. For system users, the key is not deleted and throws an alert that key has gone over 90 days.
In the absence of anyone else at my workplace explaining this to me, I want to understand how this policy could have been implemented within AWS.
Where can I look into our AWS account to learn more about this implementation. thanks
See Getting credential reports for your AWS account. There is an underlying IAM API called GetCredentialReport.
One way to call it is via the awscli:
Passwords expire based on a password policy. Also see Managing access keys for IAM users.