This rule focuses on restricting decryption actions on all KMS keys within IAM customer managed policies.
Rule | IAM customer managed policies should not allow decryption actions on all KMS keys |
Framework | AWS Foundational Security Best Practices |
Severity | ✔ Medium |
IAM Customer Managed Policies - AWS Foundational Security Best Practices
Rule Description:
IAM customer managed policies should not allow decryption actions on all KMS keys for AWS Foundational Security Best Practices. This rule helps protect sensitive data by ensuring that permissions to decrypt all KMS keys are not granted to IAM users or roles.
Reasoning:
Allowing unrestricted decryption actions on all KMS keys can pose a significant security risk. It can potentially enable unauthorized access to sensitive information and compromise the confidentiality of data stored in AWS services that utilize KMS for encryption.
Remediation:
The following steps outline how to remediate this issue by updating the IAM customer managed policies to restrict decryption actions on specific KMS keys:
Identify the affected IAM policies:
kms:Decrypt
) allowed on all KMS keys.Update the affected policies:
Restrict decryption actions to specific KMS keys:
Verify and test the updated policies:
Troubleshooting:
If users are unable to decrypt data even with the correct permissions, consider the following troubleshooting steps:
Verify the policy changes:
kms:Decrypt
) are allowed only on the specific KMS keys required.Check IAM user or role permissions:
Review key policies for conflicts:
Verify KMS key configuration:
Additional Resources:
Note: It is recommended to follow AWS security best practices and perform regular audits to ensure that IAM policies are aligned with the principle of least privilege, limiting access to sensitive resources such as KMS keys.