How to find inactive access policies and clean them up to enhance security for your IBM Cloud environment.