Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

IAM Root User should not have Access Keys Rule

This rule ensures that the IAM root user does not have any access keys for security measures.

RuleIAM root user should not have access keys
FrameworkGxP 21 CFR Part 11
Severity
Medium

Title: IAM Root User Access Key Restrictions for GxP 21 CFR Part 11 Compliance

Description:

In order to ensure compliance with GxP (Good Practices for regulatory compliance in pharmaceutical industries) and 21 CFR Part 11 (regulations on electronic records and signatures), it is essential to restrict the usage of access keys for the IAM (Identity and Access Management) root user. The IAM root user has unrestricted access to all AWS services, and as such, it is critical to avoid any potential security risks by disabling access keys for this user.

Policy Details:

  • Policy Name: IAM Root User Access Key Restrictions
  • Policy ID: <insert_policy_id_here>
  • Compliance Regulation: GxP 21 CFR Part 11
  • Affected Resources: IAM Root User

Troubleshooting Steps:

If access keys are found to be active for the IAM root user, follow these troubleshooting steps to disable them:

  1. 1.
    Login to the AWS Management Console using credentials with administrative privileges.
  2. 2.
    Navigate to the IAM service.
  3. 3.
    Click on "Users" in the left sidebar menu.
  4. 4.
    Search for "root" in the User search bar.
  5. 5.
    Select the IAM root user from the list.
  6. 6.
    In the "Security credentials" tab, check if there are any access keys listed.
  7. 7.
    If access keys are present, click on the "Delete access key" button next to each active key.
  8. 8.
    Confirm the action when prompted.
  9. 9.
    Ensure that access keys are successfully deleted for the IAM root user.

Necessary Code:

To enforce the policy mentioned above, you can use the following AWS CLI command:

aws iam delete-access-key --user-name <IAM_root_user_name> --access-key-id <access_key_id>

Replace

<IAM_root_user_name>
with the username of the IAM root user and
<access_key_id>
with the specific access key ID you wish to delete.

Remediation Steps:

To comply with the IAM root user access key restrictions for GxP 21 CFR Part 11, follow these steps:

  1. 1.
    Open your preferred command-line interface or terminal.
  2. 2.
    Install the AWS CLI (Command Line Interface) if you haven't already.
  3. 3.
    Configure the AWS CLI with the necessary access credentials by running the
    aws configure
    command.
  4. 4.
    Run the following AWS CLI command to delete the access key for the IAM root user:
aws iam delete-access-key --user-name <IAM_root_user_name> --access-key-id <access_key_id>

Replace

<IAM_root_user_name>
with the username of the IAM root user and
<access_key_id>
with the specific access key ID you wish to delete. 5. Verify that the access key for the IAM root user has been successfully deleted.

Note: It is recommended to follow the principle of least privilege and not utilize the IAM root user for day-to-day tasks. Create and use IAM users with appropriate permissions instead to maintain proper access control and security.

By implementing these access key restrictions, you ensure compliance with GxP 21 CFR Part 11 regulations and reduce the risk of unauthorized access to sensitive systems and data within your AWS environment.

Is your System Free of Underlying Vulnerabilities?
Find Out Now