This rule ensures IAM policies do not contain statements granting admin access.
Rule | IAM policy should not have statements with admin access |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
IAM Policy Rule Description:
This rule ensures that the IAM (Identity and Access Management) policies in an organization do not contain any statements granting administrative access, in compliance with the NIST (National Institute of Standards and Technology) 800-171 Revision 2 guidelines.
Troubleshooting Steps:
Necessary Code:
There is no specific code required for this rule. However, you can use AWS CLI (Command Line Interface) to interact with IAM policies if needed.
Step-by-Step Guide for Remediation:
Step 1: Identify the IAM Policy
Step 2: Review Policy Statements
Step 3: Verify Policy Requirements
Step 4: Modify Policy Statements
Step 5: Validate Policy Compliance
Use AWS CLI to validate the updated policy for compliance with NIST 800-171 Revision 2.
aws iam simulate-custom-policy --policy-input-list file://policy.json --resource-arns arn:aws:s3:::example-bucket
Note: Make sure to replace "policy.json" with the path to the JSON file containing your policy statement(s), and "arn:aws:s3:::example-bucket" with an appropriate resource ARN.
Review the policy simulation results. Verify that no admin access is granted in the evaluated policy.
Conclusion:
By following this step-by-step guide, you can ensure compliance with the NIST 800-171 Revision 2 guidelines by eliminating IAM policy statements that grant admin access. Regularly reviewing and updating policies will help maintain a secure and compliant IAM configuration.