This rule ensures IAM policy does not contain statements granting admin access.
Rule | IAM policy should not have statements with admin access |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description:
This rule ensures that the IAM policies do not contain any statements granting admin access according to the NIST 800-53 Revision 5 security framework. Admin access typically grants unrestricted privileges, which poses a significant security risk to the system. This rule aims to enforce the principle of least privilege by restricting the unnecessary administrative access in IAM policies.
Troubleshooting Steps:
Remediation:
CLI Command:
To create a new IAM policy (if needed):
aws iam create-policy --policy-name <policy-name> --policy-document file://<policy-document.json>
To update an existing IAM policy:
aws iam update-policy --policy-arn <policy-arn> --policy-document file://<policy-document.json>
To attach the policy to a user:
aws iam attach-user-policy --user-name <user-name> --policy-arn <policy-arn>
To attach the policy to a role:
aws iam attach-role-policy --role-name <role-name> --policy-arn <policy-arn>
Note:
Replace the placeholders within angle brackets ('<>') with the actual values specific to your environment. Ensure that you have the necessary permissions to perform these actions.