Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

IAM Groups Rule

This rule states that IAM groups should have at least one user to ensure proper access control.

RuleIAM groups should have at least one user
FrameworkFedRAMP Moderate Revision 4
Severity
High

IAM Group Rule Description:

According to the FedRAMP (Federal Risk and Authorization Management Program) guidelines, IAM (Identity and Access Management) groups in the organization's system must have at least one user assigned to them. This rule is specific to the FedRAMP Moderate security level, as defined in Revision 4 of the FedRAMP guidelines.

Troubleshooting Steps:

If your IAM group does not have any user assigned to it, you can follow these troubleshooting steps:

  1. 1.
    Verify IAM Group Configuration: Check the configuration of the IAM groups in your system to determine if any group is missing user assignments.
  2. 2.
    Identify Affected Groups: Identify the IAM groups that currently do not have any users assigned to them.
  3. 3.
    Analyze Group Usage: Determine if the affected groups are actively being used or if they have become obsolete.
  4. 4.
    Evaluate Group Membership: Confirm that the absence of users in the affected groups is not due to an oversight or mistake during user provisioning.

Necessary Codes:

No specific code is necessary for this rule. The configuration and assignment of users to IAM groups can usually be done through the organization's IAM management console or by using the appropriate APIs and SDKs provided by the cloud service provider.

Step-by-Step Remediation Guide:

To remediate the IAM groups without any user assignments, follow these step-by-step instructions:

  1. 1.
    Log in to the IAM management console or access the API/SDK provided by your cloud service provider.
  2. 2.
    Identify the IAM group(s) that do not have any user assigned.
  3. 3.
    Determine the purpose and necessity of each affected IAM group to decide on the appropriate action:
    • If the affected group is still required: a. Search for the appropriate user(s) to add to the group. b. Either create a new user or select an existing user to add to the group. c. Assign the user(s) to the IAM group by following the console/API instructions.
    • If the affected group is no longer needed: a. Remove the IAM group from your system following the console/API instructions.

Note: It is essential to review and confirm that the addition or removal of users from IAM groups aligns with your organization's security policies and access requirements.

CLI Command for IAM Group Management (AWS Example):

If you are using AWS IAM, here are some example CLI commands for IAM group management:

  1. 1.

    To list all the IAM groups:

    aws iam list-groups
    
  2. 2.

    To add a user to an IAM group:

    aws iam add-user-to-group --group-name <group-name> --user-name <user-name>
    
  3. 3.

    To remove a user from an IAM group:

    aws iam remove-user-from-group --group-name <group-name> --user-name <user-name>
    

Please note that the exact commands may vary depending on the cloud service provider, and it's essential to refer to their official documentation for the specific commands and syntax.

Is your System Free of Underlying Vulnerabilities?
Find Out Now