This rule ensures managed IAM policies do not allow blocked actions on KMS keys.
Rule | Ensure managed IAM policies should not allow blocked actions on KMS keys |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Medium |
Rule Description
This rule ensures that managed IAM policies do not allow blocked actions on Key Management Service (KMS) keys, specifically for FedRAMP Low Revision 4 compliance.
Troubleshooting Steps
If an IAM policy allows blocked actions on KMS keys for FedRAMP Low Revision 4, you can follow these troubleshooting steps to rectify the issue:
Necessary Code
If the IAM policy needs to be modified, you can use the AWS Command Line Interface (CLI) to update the policy. Here is an example code snippet:
aws iam put-role-policy --role-name <role-name> --policy-name <policy-name> --policy-document file://policy.json
In the code above, replace
<role-name>
with the name of the IAM role that has the policy attached, <policy-name>
with the desired name for the policy, and policy.json
with the file containing the modified policy document.Step-by-Step Guide for Remediation
To remediate an IAM policy that allows blocked actions on KMS keys for FedRAMP Low Revision 4 compliance, follow these step-by-step instructions:
Identify the IAM policy:
Review the permissions granted by the policy:
Determine which actions are blocked:
Modify the IAM policy:
Test the modified policy:
Monitor and evaluate IAM policy changes:
By following these steps, you can ensure that managed IAM policies do not allow blocked actions on KMS keys for FedRAMP Low Revision 4 compliance.