This rule details that IAM policy should not include statements granting admin access.
Rule | IAM policy should not have statements with admin access |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description:
The IAM policy should not include statements granting admin access as per NIST 800-53 Revision 5. Admin access refers to the highest level of privileges that can be granted in an AWS account, allowing complete control over resources and services. This rule is enforced to adhere to security best practices and prevent unauthorized access or misuse of sensitive data.
Troubleshooting Steps:
If you encounter any issues related to IAM policies with admin access, follow these troubleshooting steps:
Remediation:
To remediate the IAM policy that violates the rule, follow the step-by-step guide below:
Relevant Code:
If you prefer to use AWS CLI or AWS SDK for automation, here's an example command to update an IAM policy:
aws iam put-user-policy --user-name <USER_NAME> --policy-name <POLICY_NAME> --policy-document file://policy.json
Ensure that you replace
<USER_NAME>
with the actual IAM user name and <POLICY_NAME>
with the name of the policy you want to update. Also, modify the policy.json
file to reflect the desired policy document without any admin access statements.Conclusion:
By following the troubleshooting steps and performing the recommended remediation actions, you can ensure that the IAM policy adheres to the security requirements defined by NIST 800-53 Revision 5. Regularly reviewing and updating policies can help ensure proper access controls and minimize the risk of unauthorized privilege escalation within your AWS environment.