This rule states that the IAM root user should not have access keys configured, to enhance security measures.
Rule | IAM root user should not have access keys |
Framework | CISA-cyber-essentials |
Severity | ✔ Medium |
Rule Description:
The IAM root user should not have access keys for CISA-cyber-essentials. This rule aims to enforce security best practices by preventing the IAM root user from having access keys, which can potentially be compromised and used to gain unauthorized access to critical resources.
Troubleshooting Steps (if any):
If access keys are found for the IAM root user in CISA-cyber-essentials, follow the steps below to remediate the issue:
Necessary Codes (if any):
No specific code is required for this rule.
Remediation Steps:
To remove access keys for the IAM root user in CISA-cyber-essentials, follow the step-by-step guide below:
Note: It is recommended to follow the principle of least privilege and avoid using the IAM root user for day-to-day operations. Instead, create separate IAM users with limited permissions for different tasks and assign appropriate roles and policies.
By adhering to this rule, you help minimize the potential security risks associated with IAM root user access keys in the CISA-cyber-essentials environment.