This rule ensures that the IAM root user does not have any access keys for security measures.
Rule | IAM root user should not have access keys |
Framework | GxP 21 CFR Part 11 |
Severity | ✔ Medium |
Title: IAM Root User Access Key Restrictions for GxP 21 CFR Part 11 Compliance
Description:
In order to ensure compliance with GxP (Good Practices for regulatory compliance in pharmaceutical industries) and 21 CFR Part 11 (regulations on electronic records and signatures), it is essential to restrict the usage of access keys for the IAM (Identity and Access Management) root user. The IAM root user has unrestricted access to all AWS services, and as such, it is critical to avoid any potential security risks by disabling access keys for this user.
Policy Details:
Troubleshooting Steps:
If access keys are found to be active for the IAM root user, follow these troubleshooting steps to disable them:
Necessary Code:
To enforce the policy mentioned above, you can use the following AWS CLI command:
aws iam delete-access-key --user-name <IAM_root_user_name> --access-key-id <access_key_id>
Replace
<IAM_root_user_name>
with the username of the IAM root user and <access_key_id>
with the specific access key ID you wish to delete.Remediation Steps:
To comply with the IAM root user access key restrictions for GxP 21 CFR Part 11, follow these steps:
aws configure
command.aws iam delete-access-key --user-name <IAM_root_user_name> --access-key-id <access_key_id>
Replace
<IAM_root_user_name>
with the username of the IAM root user and <access_key_id>
with the specific access key ID you wish to delete.
5. Verify that the access key for the IAM root user has been successfully deleted.Note: It is recommended to follow the principle of least privilege and not utilize the IAM root user for day-to-day tasks. Create and use IAM users with appropriate permissions instead to maintain proper access control and security.
By implementing these access key restrictions, you ensure compliance with GxP 21 CFR Part 11 regulations and reduce the risk of unauthorized access to sensitive systems and data within your AWS environment.