This rule states that the IAM root user should not have access keys.
Rule | IAM root user should not have access keys |
Framework | CISA-cyber-essentials |
Severity | ✔ Medium |
IAM Rule: Root User Access Keys for CISA Cyber Essentials
Description:
This rule ensures that the root user in AWS Identity and Access Management (IAM) does not have any access keys associated with it. This is important to minimize the risk of unauthorized access and potential security breaches to the AWS account.
Having access keys for the root user poses a significant security risk because they provide unrestricted access and control over all resources within the AWS account. To align with the CISA Cyber Essentials guidelines, it is necessary to disable access keys for the root user.
Troubleshooting Steps and Remediation:
1. Verify the existence of access keys for the root user:
To check if access keys are associated with the root user, follow these steps:
2. Disable and delete the access keys:
To disable and delete access keys for the root user, perform the following:
3. Remove permissions for IAM user with access keys:
If an IAM user with access keys exists and has administrative privileges, it is important to remove those permissions to align with the CISA Cyber Essentials policy. Follow these steps:
4. Enable multi-factor authentication (MFA) for root user:
To enhance the security of the root user account, it is highly recommended to enable multi-factor authentication (MFA). Follow these steps to enable MFA for the root user:
Conclusion:
By adhering to the rule and removing access keys from the root user, you significantly reduce the risk of unauthorized access to your AWS account. Disabling access keys and enabling MFA for the root user are essential steps in achieving a more secure and compliant AWS environment, aligning with the guidelines set by CISA Cyber Essentials.