This rule ensures IAM policies do not grant admin access, promoting least privilege principle.
Rule | IAM policy should not have statements with admin access |
Framework | GxP 21 CFR Part 11 |
Severity | ✔ High |
Rule Description:
The IAM policy should not contain any statements that grant administrator access permissions for GxP (Good Practices) 21 CFR Part 11. This regulation focuses on electronic records and electronic signatures in various industries such as pharmaceutical, biotechnology, and medical device companies. Granting admin access in this context may pose security and compliance risks.
Troubleshooting Steps:
If an IAM policy contains statements with admin access for GxP 21 CFR Part 11, it can result in violations of compliance requirements and potential security breaches. To troubleshoot and rectify this issue, follow these steps:
Review existing IAM policies:
Identify the affected permissions:
Remove or modify policy statements:
Test and validate changes:
Necessary Codes (if applicable):
The following code snippets demonstrate how to modify an IAM policy using the AWS Command Line Interface (CLI). These examples showcase the removal of an admin access statement for GxP 21 CFR Part 11:
aws iam delete-policy --policy-arn <policy-arn>
aws iam update-policy --policy-arn <policy-arn> --policy-document file://policy.json
Note: Replace
<policy-arn>
with the ARN (Amazon Resource Name) of the IAM policy you want to modify. The policy.json
file should contain the updated policy document.Step-by-Step Guide for Remediation:
Note: It is crucial to involve a qualified compliance or security expert during the process to ensure adherence to applicable regulations.