This rule states that IAM users should not have any inline or attached policies for security reasons.
Rule | IAM user should not have any inline or attached policies |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
Rule Description
The rule states that IAM users should not have any inline or attached policies that are not compliant with NIST 800-53 Revision 5. This rule is important for maintaining the security and compliance of the AWS environment and preventing unauthorized access or inappropriate permissions for IAM users.
Troubleshooting Steps
If an IAM user is found with non-compliant inline or attached policies, the following troubleshooting steps can be taken:
Necessary Codes
No specific codes are required for this rule. However, you can utilize AWS CLI commands for listing and modifying IAM policies if necessary during the remediation process.
Remediation Steps
To remediate the non-compliant inline or attached policies for IAM users, follow these step-by-step guide:
Detaching Non-Compliant Policies
If there are non-compliant policies attached to the IAM user, follow these steps to detach them:
Deleting Non-Compliant Inline Policies
If there are non-compliant inline policies, follow these steps to delete them:
Verification
After detaching or deleting the non-compliant inline or attached policies, follow these steps to verify compliance:
By following the above remediation steps, you can ensure that IAM users do not have any inline or attached policies that violate NIST 800-53 Revision 5.