This rule ensures IAM policy does not contain statements with admin access.
Rule | IAM policy should not have statements with admin access |
Framework | HIPAA |
Severity | ✔ High |
IAM Policy Best Practices for HIPAA Compliance
Overview of IAM Policy for HIPAA Compliance
In the context of AWS IAM (Identity and Access Management), ensuring compliance with the Health Insurance Portability and Accountability Act (HIPAA) requires implementing policies that restrict administrative access to the minimum necessary. HIPAA compliance demands stringent protection of personal health information (PHI), and that includes avoiding overly permissive access policies.
Details of the Rule
Troubleshooting Steps
Reviewing and Identifying Admin Access
Audit Current Policies:
"Action": ["*"]
and "Resource": ["*"]
Policy Evaluation:
Minimizing Admin Access
Revise Policies:
"Allow"
statements with admin access.Testing Changes:
Necessary Codes and CLI Commands
Fetching IAM Policies
aws iam list-policies --scope Local --query 'Policies[?PolicyName==`YourPolicyName`]'
Auditing IAM Policy for Admin Access
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"*"
],
"Resource": "*"
}
]
}
If the above is found, it implies admin access and must be addressed.
Sample Policy Restricting Access
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject"
],
"Resource": [
"arn:aws:s3:::yourbucket/yourpath/*"
]
}
]
}
Modifying IAM Policy Using CLI
aws iam create-policy-version --policy-arn arn:aws:iam::123456789012:policy/YourPolicyName --policy-document file://new-policy.json --set-as-default
new-policy.json
should contain the new, non-administrative permissions.Deleting Old Policy Versions
aws iam delete-policy-version --policy-arn arn:aws:iam::123456789012:policy/YourPolicyName --version-id v1
Step by Step Guide for Remediation
Identifying and Creating Least-Privileged Policies
Regular Audits and Monitoring
Conclusion
Creating an IAM environment that meets HIPAA requirements demands careful construction and regular review of policies to maintain the principle of least privilege. By avoiding broad administrative privileges and closely monitoring access patterns, AWS account administrators can greatly reduce the risk of non-compliance with HIPAA. Additionally, utilizing AWS's native tools for simulation, analysis, and monitoring will support maintaining a secure and compliant posture.