This rule ensures IAM root user does not have access keys, enhancing security measures.
Rule | IAM root user should not have access keys |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description
The IAM root user should not have any access keys associated with it to comply with NIST 800-53 Revision 5 security standards. This rule ensures that the credentials for the root user, which have unrestricted access to the entire AWS account, are not exposed or misused.
Troubleshooting Steps
If access keys are found for the IAM root user, it indicates a potential security vulnerability. Follow these steps to troubleshoot and rectify the issue:
If access keys are found: 7. Click on the "Security credentials" tab. 8. In the "Access keys" section, select the access key. 9. Click on "Delete Access Key" and confirm the deletion when prompted. 10. Repeat steps 8 and 9 for any additional access keys.
Remediation Steps
If access keys were found during troubleshooting, follow the steps below to remediate the issue and ensure compliance with NIST 800-53 Rev 5:
Restrict AWS account access through the IAM root user.
Rotate or disable any existing access keys associated with the root user.
Implement multi-factor authentication (MFA) for the IAM root user.
Regularly monitor and review IAM users and their access.
CLI Commands (if applicable)
If you prefer using the AWS Command Line Interface (CLI) to remediate the issue, you can use the following commands:
aws iam list-access-keys --user-name <root_user_name>
aws iam delete-access-key --access-key-id <access_key_id> --user-name <root_user_name>
aws iam create-access-key --user-name <root_user_name>
Note: Replace
<root_user_name>
with the actual name of your root user, <access_key_id>
with the ID of the access key to delete.Remember to follow the necessary security and best practices when using CLI commands, such as securing access to your AWS credentials and using secure channels for communication.
By following these steps and guidelines, you can ensure that the IAM root user does not have access keys, thus maintaining compliance with NIST 800-53 Revision 5 security standards.