This rule ensures IAM policies do not contain statements with admin access to enhance security measures.
Rule | IAM policy should not have statements with admin access |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description:
IAM policies within the organization should not have any statements that grant admin access, in accordance with the guidelines provided by NIST 800-53 Revision 5. This rule is implemented to ensure proper access control and minimize the risk of unauthorized or excessive privileges being granted to users or roles. Admin access should only be assigned to individuals or roles with a legitimate need for such high-level permissions.
Troubleshooting Steps:
If any IAM policy is found with statements granting admin access, the following troubleshooting steps should be undertaken:
Identify the policy: Determine which IAM policy contains the statement(s) with admin access.
Review policy permissions: Carefully examine the permissions granted by the policy and identify the statement(s) that provide admin access.
Validate the necessity: Check if the admin access is essential for the identified users or roles. Evaluate whether the level of access can be reduced without impacting user requirements.
Modify the policy: If admin access is not required or can be reduced, update the policy to remove or limit the admin statements. Make sure the modified policy still fulfills the legitimate needs of the users or roles.
Test the modified policy: Verify the updated policy to ensure that it does not grant admin access. Test with appropriate scenarios to validate that the required functionality is maintained without any excessive permissions.
Communicate changes: Notify the affected users or roles about the modification made to their policy, explaining the reasons for the change. Provide any necessary guidance or assistance for them to adapt to the updated policy.
Remediation Steps:
To remediate an IAM policy that grants admin access, follow these step-by-step instructions:
Identify the Policy:
Review Policies:
Edit the Policy:
Remove Admin Access Statements:
Validate and Save Changes:
Test the Modified Policy:
Communicate Changes:
Additional Notes:
It is recommended to regularly review IAM policies and their permissions, ensuring that they adhere to the policy defined in the rule. Periodic audits and assessments can help identify any potential policy violations and take remedial actions promptly.