Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

IAM Users in Group Rule

This rule ensures IAM users are in at least one group for improved security and access control.

RuleIAM users should be in at least one group
FrameworkNIST 800-53 Revision 5
Severity
High

Rule Description:

IAM users should be assigned to at least one group in order to comply with the NIST 800-53 Revision 5 security requirement. By assigning IAM users to groups, access permissions can be managed in a more organized and efficient manner. This rule helps ensure that proper access controls are in place, minimizing the risk of unauthorized access to sensitive resources within the AWS environment.

Troubleshooting Steps:

If an IAM user is not assigned to any group, follow these troubleshooting steps:

  1. 1.
    Identify the IAM user(s) not part of any group by accessing the AWS Management Console or using AWS CLI commands.
  2. 2.
    Determine the reason why the user was not assigned to a group.
  3. 3.
    Verify if the user has specific individual permissions assigned directly to them instead of being managed through group membership.
  4. 4.
    Review the user's access requirements and identify an appropriate group(s) that aligns with their responsibilities.
  5. 5.
    Check if there are any issues preventing the assignment of the user to a group, such as policy conflicts or limitations on group membership.
  6. 6.
    Ensure that the necessary policies or permissions are assigned to the group, so that user access is properly defined within the AWS environment.
  7. 7.
    Confirm that the user has been successfully added to the appropriate group.
  8. 8.
    Test the user's access permissions to ensure they can perform their intended tasks.

Necessary Code:

No specific code is required for this rule.

Step-by-Step Guide for Remediation:

To remediate this issue, follow the steps below:

  1. 1.
    Sign in to the AWS Management Console with appropriate IAM credentials.
  2. 2.
    Open the IAM dashboard by navigating to the IAM service.
  3. 3.
    Click on "Users" in the left sidebar to view the list of IAM users in your account.
  4. 4.
    Identify the user(s) that are not assigned to any group.
  5. 5.
    Select the user(s) you want to assign to a group by checking the corresponding checkbox(es).
  6. 6.
    Click on the "Add user to group" button at the top.
  7. 7.
    In the dialog box that appears, select the desired group(s) by checking the checkboxes next to their names.
  8. 8.
    Click on the "Add to groups" button to assign the user(s) to the selected group(s).
  9. 9.
    Ensure that the necessary permissions and policies are attached to the group(s) to define the desired level of access for the user(s).
  10. 10.
    Verify that the user(s) have been successfully added to the group(s) by checking their group membership status.
  11. 11.
    Test the user's access to resources according to their group permissions to validate the changes made.

By following these steps, you will ensure that all IAM users are assigned to at least one group, meeting the compliance requirements of NIST 800-53 Revision 5.

Is your System Free of Underlying Vulnerabilities?
Find Out Now