This rule ensures that the IAM root user does not have access keys, maintaining security best practices.
Rule | IAM root user should not have access keys |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description:
The rule states that the root user in IAM should not have any access keys for compliance with NIST 800-53 Revision 5. This is to ensure a higher level of security by restricting the use of access keys for the root user.
Troubleshooting Steps:
If the root user has access keys, they need to be removed to comply with the rule. The following steps can be followed for troubleshooting:
Verify if the root user has access keys associated:
Take note of any applications or services that might be using the access keys.
Remediation Steps:
To comply with the rule and remove the access keys from the root user, the following steps can be undertaken:
Determine a replacement authentication method:
Delete the access keys for the root user:
Implement the replacement authentication method:
Update applications or services if required:
Monitor and enforce compliance:
By following these steps, you can ensure that the root user in IAM does not have any access keys as required by the NIST 800-53 Revision 5 standard, thereby enhancing the security of your AWS environment.