This rule states that IAM users should not have any inline or attached policies.
Rule | IAM user should not have any inline or attached policies |
Framework | RBI Cyber Security Framework |
Severity | ✔ Low |
Rule Description
The rule prohibits IAM users from having any inline or attached policies related to the RBI Cyber Security Framework. Inline policies are policies that are directly attached to an IAM user, while attached policies are policies attached to a group, role, or resource. This rule ensures compliance with the RBI Cyber Security Framework regulations by preventing users from having any policy that may not align with the required security standards.
Troubleshooting Steps
If any IAM user is found to have inline or attached policies related to the RBI Cyber Security Framework, the following troubleshooting steps can be followed:
Necessary Code
There are no specific codes required for this rule. However, you may need to use AWS CLI commands to identify and remove the inline or attached policies associated with IAM users.
Step-by-Step Guide for Remediation
To remediate the violation of this rule and remove the inline or attached policies related to the RBI Cyber Security Framework from IAM users, follow these steps:
Identify the IAM user with the policy violation:
Remove any attached policy violating the rule:
Delete any inline policy violating the rule:
Review and confirm the changes:
Conduct periodic checks:
Conclusion
Following the provided troubleshooting steps and the step-by-step guide should help identify and remediate any violation of IAM users having inline or attached policies related to the RBI Cyber Security Framework. By ensuring compliance with this rule, you maintain a secure environment that aligns with the required security standards and regulatory framework.