This rule specifies that IAM users should not have any inline or attached policies for cybersecurity control.
Rule | IAM user should not have any inline or attached policies |
Framework | Federal Financial Institutions Examination Council (FFIEC) |
Severity | ✔ Low |
Rule Description:
IAM users should not have any inline or attached policies for the Federal Financial Institutions Examination Council (FFIEC).
Inline and attached policies can grant access permissions to various AWS resources and services. However, in the context of the Federal Financial Institutions Examination Council (FFIEC), it is essential to ensure that IAM users do not possess any policies related to FFIEC. This rule helps enforce compliance with security and regulatory requirements specific to FFIEC.
Remediation Steps:
Identify IAM Users:
Review Policies:
aws iam list-attached-user-policies --user-name <IAM-username>
Review Inline Policies:
aws iam list-user-policies --user-name <IAM-username>
Remove FFIEC Policies:
For any identified policies related to FFIEC, you should remove them.
To detach a policy from an IAM user, execute the following AWS CLI command:
aws iam detach-user-policy --user-name <IAM-username> --policy-arn <policy-arn>
If there are inline policies, remove them by executing the following AWS CLI command:
aws iam delete-user-policy --user-name <IAM-username> --policy-name <policy-name>
Monitoring and Compliance:
Troubleshooting:
If you encounter any issues while remediating this rule, consider the following troubleshooting steps:
Permission Errors:
Policy Not Found:
aws iam detach-user-policy
or aws iam delete-user-policy
commands.If the troubleshooting steps do not resolve the issue, consider reviewing the AWS IAM documentation or contacting AWS Support for further assistance.
Note: Ensure that you comply with any additional regulations or policies applicable to your organization apart from FFIEC.