Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

IAM Policy Rule: Avoid Admin Access Statements

This rule ensures IAM policies do not contain statements granting admin access.

RuleIAM policy should not have statements with admin access
FrameworkNIST 800-171 Revision 2
Severity
High

IAM Policy Rule Description:

This rule ensures that the IAM (Identity and Access Management) policies in an organization do not contain any statements granting administrative access, in compliance with the NIST (National Institute of Standards and Technology) 800-171 Revision 2 guidelines.

Troubleshooting Steps:

  1. 1.
    Identify the IAM policy with admin access statements.
  2. 2.
    Review each policy statement to determine if it grants admin access.
  3. 3.
    Verify the NIST 800-171 Revision 2 guidelines for policy requirements.
  4. 4.
    Modify the policy statement(s) to remove admin access.
  5. 5.
    Validate the updated policy to ensure compliance.

Necessary Code:

There is no specific code required for this rule. However, you can use AWS CLI (Command Line Interface) to interact with IAM policies if needed.

Step-by-Step Guide for Remediation:

Step 1: Identify the IAM Policy

  1. 1.
    Log in to the AWS Management Console.

Step 2: Review Policy Statements

  1. 1.
    Navigate to the IAM service.
  2. 2.
    Click on "Policies" in the left-hand menu.
  3. 3.
    Search for the policy that needs to be reviewed.

Step 3: Verify Policy Requirements

  1. 1.
    Refer to the NIST 800-171 Revision 2 guidelines to understand the specific policy requirements.
  2. 2.
    Review each policy statement to identify any admin access grants.

Step 4: Modify Policy Statements

  1. 1.
    If you find any policy statement granting admin access:
    • Click on the policy name to open it.
    • Find the statement with admin access and remove it.
    • Save the policy.

Step 5: Validate Policy Compliance

  1. 1.

    Use AWS CLI to validate the updated policy for compliance with NIST 800-171 Revision 2.

    • Run the following command:
      aws iam simulate-custom-policy --policy-input-list file://policy.json --resource-arns arn:aws:s3:::example-bucket

    Note: Make sure to replace "policy.json" with the path to the JSON file containing your policy statement(s), and "arn:aws:s3:::example-bucket" with an appropriate resource ARN.

  2. 2.

    Review the policy simulation results. Verify that no admin access is granted in the evaluated policy.

Conclusion:

By following this step-by-step guide, you can ensure compliance with the NIST 800-171 Revision 2 guidelines by eliminating IAM policy statements that grant admin access. Regularly reviewing and updating policies will help maintain a secure and compliant IAM configuration.

Is your System Free of Underlying Vulnerabilities?
Find Out Now