This rule ensures that managed IAM policies do not permit blocked actions on KMS keys.
Rule | Ensure managed IAM policies should not allow blocked actions on KMS keys |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Medium |
Rule Description:
This rule ensures that managed IAM policies do not allow blocked actions on Key Management Service (KMS) keys in compliance with NIST 800-171 Revision 2. KMS keys are used to encrypt and decrypt data in AWS services, and it is important to restrict access to these keys to prevent unauthorized access or compromise of sensitive information.
Troubleshooting Steps:
Necessary Code:
No specific code is required for this rule. However, you can use the AWS CLI or AWS Management Console to review and modify IAM policies if needed.
Remediation Steps:
The following steps outline how to remediate an IAM policy that allows blocked actions on KMS keys:
aws iam get-group --group-name <group-name>
Note:
It is crucial to exercise caution while modifying IAM policies to ensure that necessary permissions are granted while disallowing any blocked actions as defined by NIST 800-171 Revision 2. Regularly review and monitor IAM policies to maintain compliance with security requirements and promptly address any violations.