This rule ensures the IAM root user does not have access keys for enhanced security.
Rule | IAM root user should not have access keys |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description:
IAM root user should not have access keys for NIST 800-53 Revision 5.
Access keys are long-term credentials used by AWS Identity and Access Management (IAM) users or AWS services to make programmatic calls to AWS services.
In order to comply with NIST 800-53 Revision 5, it is recommended to disable access keys for the root user. The root user is highly privileged and has unrestricted access to all resources in an AWS account, and hence should not be using access keys for security reasons.
Troubleshooting Steps (if any):
No specific troubleshooting steps are required for this rule.
Necessary Code (if any):
No specific code is required for this rule.
Remediation:
Step 1:
Step 2:
Step 3:
Step 4:
Step 5:
Step 6:
Step 7:
Step 8:
Conclusion:
By following the above steps, you can ensure that the IAM root user does not have access keys, thus complying with the NIST 800-53 Revision 5 policy. This helps to enhance the overall security posture of your AWS account.