This rule ensures that managed IAM policies do not permit blocked actions on KMS keys.
Rule | Ensure managed IAM policies should not allow blocked actions on KMS keys |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ Medium |
Rule Description
This rule is designed to ensure that managed IAM policies do not allow blocked actions on Key Management Service (KMS) keys for FedRAMP Moderate Revision 4 compliance.
KMS keys are used to encrypt and decrypt data in AWS services. To comply with FedRAMP Moderate security requirements (per Revision 4), it is crucial to prevent any unauthorized or blocked actions on KMS keys. This ensures the confidentiality and integrity of sensitive data stored in AWS.
Troubleshooting Steps
If this rule is violated, here are the troubleshooting steps you can follow:
Necessary Codes
If necessary, you can use the AWS Command Line Interface (CLI) to audit, analyze, and remediate the policy violations for KMS keys. Here are some relevant commands:
aws kms list-key-policies --key-id <key-id>
aws kms get-key-policy --key-id <key-id> --policy-name <policy-name>
aws kms put-key-policy --key-id <key-id> --policy-name <policy-name> --policy <policy-json>
Replace
<key-id>
with the ID of the KMS key, <policy-name>
with the name of the policy, and <policy-json>
with the updated policy in JSON format.Remediation Steps
To remediate the violation of this rule, you need to follow these steps:
Note: It is recommended to test the policy changes in a non-production environment before applying them to critical resources.
By following these steps and using the provided CLI commands, you can effectively remediate the violation of the managed IAM policies allowing blocked actions on KMS keys for FedRAMP Moderate Revision 4 compliance.