This rule states that the IAM root user should not have access keys for improved security.
Rule | IAM root user should not have access keys |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description
The IAM root user should not have access keys for NIST 800-53 Revision 5 compliance. The root user is the most privileged user in an AWS account and should not have permanent access keys assigned to it for security reasons. NIST 800-53 Revision 5 provides a set of security controls and guidelines for federal information systems in the United States.
Troubleshooting Steps
Identify if root user access keys exist: First, check if access keys are associated with the root user by logging in to the AWS Management Console.
Verify root user access: Confirm if the IAM user is the root user by doing the following:
Remediation Steps
To remediate the issue of the IAM root user having access keys for NIST 800-53 Revision 5 compliance, follow the steps below:
Revoke existing access keys:
Enable multi-factor authentication (MFA) for root user:
Create administrator IAM user:
Verify new IAM user access:
Following these steps will remove access keys from the root user account and enhance the security of your AWS environment while ensuring adherence to NIST 800-53 Revision 5 compliance.