This rule ensures IAM policies do not grant unrestricted admin privileges.
Rule | IAM policies should not allow full '*' administrative privileges |
Framework | PCI v3.2.1 |
Severity | ✔ High |
IAM Policy Description: Restricting Administrative Privileges for PCI Compliance (PCI v3)
Rule/Policy:
IAM policies should not grant full '*' administrative privileges for compliance with the Payment Card Industry Data Security Standard (PCI DSS) version 3.0.
Description:
To comply with PCI DSS version 3.0, it is crucial to limit and control administrative privileges within your AWS environment. Granting full '*' administrative privileges to any user or role poses a significant security risk since it provides unrestricted access to all AWS resources and actions, increasing the chances of unauthorized access and potential data breaches.
By following this rule, you ensure that no IAM user or role has complete unrestricted administrative control, reducing the risk of accidental or intentional misuse of privileges and enhancing the security posture of your AWS infrastructure in line with PCI DSS compliance.
Troubleshooting Steps:
If this policy is enforced, users or roles with full '*' administrative privileges need to be identified and their privileges modified or revoked accordingly. Follow the steps below to troubleshoot and remediate this issue:
Identify IAM users or roles with full administrative privileges:
Modify or revoke the affected IAM policies:
Test and Validate:
Necessary Codes:
No specific codes are required for this rule. However, creating and attaching new IAM policies and modifying existing ones may involve working with IAM policy JSON documents. Below is an example of IAM policy JSON for restricting administrative privileges:
{
"Version":"2012-10-17",
"Statement":[{
"Effect":"Allow",
"Action":[
"ec2:StartInstances",
"ec2:StopInstances",
"ec2:TerminateInstances"
],
"Resource":"*"
}]
}
Step-by-Step Guide for Remediation:
Follow the steps below to remediate the issue and ensure compliance with PCI DSS version 3.0:
Identify the affected IAM user(s) or role(s) that have full '*' administrative privileges.
Create a new IAM policy or modify an existing policy based on the principle of least privilege. Use the provided IAM policy JSON example as a reference, and customize the required actions and resources for the affected user(s) or role(s).
Sign in to the AWS Management Console and open the IAM console.
Navigate to the "Policies" section.
Create a new policy or select the existing policy that needs to be modified.
Choose "JSON" as the policy editor and update the policy document with the necessary permissions based on the principle of least privilege.
Validate the policy JSON for any syntax errors or incorrect permissions.
Save the policy with a meaningful name that indicates its restricted permissions and purpose.
Attach the newly created or modified policy to the affected IAM user(s) or role(s) while detaching the previous unrestricted policy.
Perform thorough testing to ensure that the restricted permissions do not cause any disruptions while allowing the necessary operations for the user(s) or role(s).
Monitor the affected IAM user(s) or role(s) to ensure compliance and periodically review their permissions to prevent any accidental privilege escalation.
By following these steps, you establish a secure and compliant IAM policy for your AWS environment according to PCI DSS version 3.0 requirements, mitigating the risks associated with granting full '*' administrative privileges.