This rule specifies that the IAM root user must not have access keys for security reasons.
Rule | IAM root user should not have access keys |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Medium |
IAM Root User Access Key Policy for FedRAMP Low Revision 4
Overview
Under the Federal Risk and Authorization Management Program (FedRAMP) Low Impact Security Controls Baseline Revision 4, it is recommended that the AWS Identity and Access Management (IAM) root user should not have access keys associated with it. The root user has full access to all resources in the AWS account and its use should be limited and monitored carefully. Access keys provide programmatic access to a given AWS account, and if compromised, they could give an attacker unfettered access to an organization's cloud resources.
Rationale
The root user's credentials are the most powerful credentials in your AWS account. Ensuring that the root user does not have access keys mitigates the risk of unauthorized access due to compromised programmatic credentials.
Remediation Steps
Step 1: Detect if Root User Has Access Keys
To check whether the root user has access keys, you can use the AWS Management Console or AWS CLI.
Using AWS Management Console
Using AWS CLI
Execute the following command to list the access keys associated with the root user:
aws iam list-access-keys --user-name root
Step 2: Delete Root User Access Keys
If access keys exist, the following measures should be taken to remove the keys:
Using AWS Management Console
Access keys
section.Delete
and confirm the deletion.Using AWS CLI
Execute the following command for each access key associated with the root user:
aws iam delete-access-key --access-key-id <ACCESS_KEY_ID> --user-name root
Replace
<ACCESS_KEY_ID>
with the actual access key ID that you wish to delete.Step 3: Monitor and Audit Root User Activity
To ensure ongoing compliance with the FedRAMP Low Revision 4 requirement, it's also critical to monitor and audit root user activity.
Best Practices
Please note that while these remediation steps can help you ensure the root user does not have access keys, they should be implemented as part of a broader security strategy to ensure compliance with FedRAMP standards.