This rule states that IAM users must not possess any inline or attached policies for enhanced security measures.
Rule | IAM user should not have any inline or attached policies |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Low |
Rule Description
Any IAM user in the system should not have any inline or attached policies that are not compliant with the NIST 800-171 Revision 2 standard. This rule aims to ensure that all IAM users adhere to the required security controls and protections outlined in the NIST 800-171 guidelines.
Rule Justification
The NIST 800-171 Revision 2 standard provides a set of security controls for protecting the confidentiality, integrity, and availability of Controlled Unclassified Information (CUI). By enforcing this rule, the organization ensures that IAM users do not have any inappropriate permissions or policies that could potentially lead to the compromise of sensitive data.
Troubleshooting Steps
If an IAM user is found to have inline or attached policies that are not compliant with NIST 800-171 Revision 2, follow these troubleshooting steps to resolve the issue:
Identify the IAM user(s) with non-compliant policies:
Review and validate the non-compliant policies:
Remediate non-compliant policies:
Detach any non-compliant attached policies:
Remove any non-compliant inline policies:
Re-evaluate permissions and assign compliant policies:
Necessary Code
No specific code is required for this remediation process. The remediation steps involve manual actions performed through the AWS Management Console.
Remediation Steps Summary