This rule ensures IAM root user should not have access keys for enhanced security.
Rule | IAM root user should not have access keys |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Medium |
Rule Description:
According to the NIST 800-171 Revision 2 security standard, the root user in AWS Identity and Access Management (IAM) should not have any access keys. This rule is implemented to enhance the security posture of the AWS environment to align with NIST 800-171 requirements.
Remediation:
To remediate this issue, you can follow the steps below:
Step 1: Identify Access Keys:
Step 2: Remove Access Keys:
Step 3: Delete Access Keys:
Troubleshooting Steps:
If you face any issues during the remediation process or encounter error messages, follow these troubleshooting steps:
Issue: Cannot Find Access Keys
Issue: Access Key Deletion Error
CLI Command:
To delete the root user's access keys using AWS CLI, follow the steps below:
aws iam delete-access-key --user-name <your-root-username> --access-key-id <your-access-key-id>
Replace
<your-root-username>
with the name of your root user, and <your-access-key-id>
with the access key ID associated with the root user.Y
or Enter
.Conclusion:
By following the provided steps, you can remove the access keys for the root user in IAM, aligning with the NIST 800-171 Revision 2 security standard. Regularly reviewing and removing access keys for the root user is essential to ensure a secure AWS environment.