Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: IAM Root User Should Not Have Access Keys

This rule states that the IAM root user should not have access keys configured, to enhance security measures.

RuleIAM root user should not have access keys
FrameworkCISA-cyber-essentials
Severity
Medium

Rule Description:

The IAM root user should not have access keys for CISA-cyber-essentials. This rule aims to enforce security best practices by preventing the IAM root user from having access keys, which can potentially be compromised and used to gain unauthorized access to critical resources.

Troubleshooting Steps (if any):

If access keys are found for the IAM root user in CISA-cyber-essentials, follow the steps below to remediate the issue:

  1. 1.
    Identify the IAM root user: In the AWS Management Console, navigate to the IAM service.
  2. 2.
    Click on "Users" in the sidebar and search for the user with the name "root".
  3. 3.
    Verify that the user is indeed the IAM root user by checking the username and the permission settings.

Necessary Codes (if any):

No specific code is required for this rule.

Remediation Steps:

To remove access keys for the IAM root user in CISA-cyber-essentials, follow the step-by-step guide below:

  1. 1.
    Sign in to AWS Management Console using root user credentials.
  2. 2.
    Navigate to the IAM service.
  3. 3.
    In the left sidebar, click on "Users."
  4. 4.
    Search for the user with the name "root" and click on it to open the user details page.
  5. 5.
    In the "Access keys" section, check if any keys are listed.
  6. 6.
    If access keys are present, click on the "Manage access keys" button.
  7. 7.
    Select the access key(s) and click on the "Delete access key(s)" button.
  8. 8.
    Confirm the deletion by clicking on "Yes, Delete" in the confirmation dialog box.
  9. 9.
    After successfully deleting the access key(s), the IAM root user will no longer have access keys in CISA-cyber-essentials.

Note: It is recommended to follow the principle of least privilege and avoid using the IAM root user for day-to-day operations. Instead, create separate IAM users with limited permissions for different tasks and assign appropriate roles and policies.

By adhering to this rule, you help minimize the potential security risks associated with IAM root user access keys in the CISA-cyber-essentials environment.

Is your System Free of Underlying Vulnerabilities?
Find Out Now