This rule ensures IAM policies do not grant admin access, promoting security best practices.
Rule | IAM policy should not have statements with admin access |
Framework | HIPAA |
Severity | ✔ High |
Rule / Policy Description:
This rule ensures that IAM policies do not include statements granting administrative access for HIPAA (Health Insurance Portability and Accountability Act) related resources in a cloud environment. Admin access should be carefully restricted to prevent unauthorized access and potential misuse of sensitive healthcare information protected by HIPAA regulations.
Troubleshooting Steps:
Necessary Code:
No specific code is required for this policy. It focuses on reviewing and modifying existing IAM policies that grant admin access for HIPAA resources.
Remediation Steps:
Amazon Web Services (AWS) - IAM Console Steps:
Amazon Web Services (AWS) - CLI Steps:
Install and configure the AWS CLI, if not already done.
Open a terminal or command prompt.
Run the following command to retrieve the policy document for the associated HIPAA IAM policy:
aws iam get-policy-version --policy-arn arn:aws:iam::Aws_account_id:policy/PolicyName --version-id v1
Replace
Aws_account_id
and PolicyName
with the actual values.Identify the policy statement(s) granting admin access in the retrieved policy document.
Remove the admin access statement(s) from the policy document.
Run the following command to update the policy:
aws iam create-policy-version --policy-arn arn:aws:iam::Aws_account_id:policy/PolicyName --policy-document file:///path/to/modified_policy.json --set-as-default
Replace
Aws_account_id
, PolicyName
, and /path/to/modified_policy.json
with the actual values.Validate the updated policy using the AWS CLI or IAM console.
Monitor the related resources and user activity to ensure the desired access restrictions are in place.
Note: