This rule ensures there are no access keys associated with the root user account.
Rule | Ensure no root user account access key exists |
Framework | cis_v130 |
Severity | ✔ High |
Ensure No Root User Account Access Key Exists for CIS v1.3.0
Description of the Rule
In the context of AWS (Amazon Web Services), the Center for Internet Security (CIS) AWS Foundations Benchmark v1.3.0 recommends that the root user account access keys should not be used or even exist. Root accounts have unrestricted access to all resources in an AWS account; therefore, it is a security best practice to not use root account access keys and instead rely on individual IAM (Identity and Access Management) user accounts with the necessary permissions.
Troubleshooting Steps
If a root account access key does exist, it may indicate that it is still being used, which would be against security best practices. Here's how to troubleshoot and address this concern:
Necessary CLI Commands
To list access keys for the root user account using the AWS CLI:
aws iam list-access-keys --user-name root
To deactivate or delete the root user access keys using the AWS CLI, you must use the access key ID that you want to deactivate or delete:
# Deactivate the root user access key aws iam update-access-key --access-key-id [ACCESS_KEY_ID] --status Inactive --user-name root # Delete the root user access key aws iam delete-access-key --access-key-id [ACCESS_KEY_ID] --user-name root
Step by Step Guide for Remediation
Confirm Root Access Key Exists: Use the
aws iam list-access-keys --user-name root
command to check for existing root user access keys.Identify Usage: Investigate through the AWS Management Console's Security Credentials page to identify when the root access key was last used, which would give an indication of where it could be in use.
Deactivate Access Key: If you cannot immediately delete the key due to existing dependencies, deactivate it using the
aws iam update-access-key
command with the --status Inactive
parameter.Migrate Permissions: Create the necessary IAM users and roles with the required permissions, thereby migrating any root access key dependencies over to more secure, principle of least privilege IAM entities.
Delete Access Key: Once all root user access key dependencies are removed, delete the key using the
aws iam delete-access-key
command.By ensuring that the root user account access key does not exist, you are adhering to the CIS AWS Foundations Benchmark v1.3.0, which enhances your AWS account security posture. Keeping remediation processes concise and devoid of unnecessary filler data ensures information is clear and actionable, which is both SEO friendly and accelerates SEO by directly addressing user search intent.