Ensure IAM user accounts that have not been used for the past 30 days are disabled
IAM users that are not actively using the AWS console for long period of time should be disabled. For this reason it is considered a security best practice to disable stale users. Ensuring that your account is restricted with MFA will help you with CIS and NIST Compliance.
Audit & Remediation
Login into your AWS account (with your root account)