Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

IAM Groups, Users, and Roles Should Not Have Any Inline Policies Rule

This rule focuses on ensuring IAM groups, users, and roles do not have any inline policies.

RuleIAM groups, users, and roles should not have any inline policies
FrameworkNIST 800-171 Revision 2
Severity
Low

Rule/Policy: No Inline Policies for IAM Groups, Users, and Roles (NIST 800-171 Revision 2)

Description:

Inline policies are directly attached to IAM groups, users, and roles within an AWS account. They can override or bypass centrally managed policies, leading to potential security risks and violations of compliance standards. This rule/policy ensures that no inline policies exist for IAM groups, users, and roles, specifically in compliance with NIST 800-171 Revision 2.

Troubleshooting Steps:

  1. 1.
    Identify the presence of inline policies for IAM groups, users, or roles.
  2. 2.
    Determine any deviation from the policy rule.
  3. 3.
    Assess the security risks associated with inline policies.
  4. 4.
    Remediate any violations to adhere to NIST 800-171 Revision 2.

Necessary Codes:

There are no specific codes required for this rule/policy. The remediation steps involve using AWS CLI commands.

Steps for Remediation:

  1. 1.
    Open the AWS Management Console and navigate to the IAM service.
  2. 2.
    Go to the "Policies" section under each IAM group, user, and role.
  3. 3.
    If inline policies exist, identify the policy to determine its purpose and impact.
  4. 4.
    Assess whether the inline policy is necessary or if it can be replaced with a centrally managed policy.
  5. 5.
    If the inline policy is deemed unnecessary, proceed with the following actions:
    • Click on the inline policy name to open its details page.
    • Review the policy document to understand its permissions and effects.
    • Once confirmed for removal, click on the "Delete Policy" button.
  6. 6.
    Repeat steps 3-5 for each IAM group, user, and role within your AWS account.
  7. 7.
    After removing all unnecessary inline policies, review the remaining policies to ensure adherence to NIST 800-171 Revision 2.

Note: Before removing any inline policies, it is crucial to verify that they are not providing any essential or unique permissions needed for specific groups, users, or roles. Always consult with your organization's security and compliance team before making any policy modifications.

Conclusion:

Adhering to the policy of not having any inline policies for IAM groups, users, and roles in compliance with NIST 800-171 Revision 2 ensures a more secure and compliant AWS environment. By following the remediation steps mentioned above, you can identify and remove any inline policies that may pose security risks or violate the specified compliance standard.

Is your System Free of Underlying Vulnerabilities?
Find Out Now