This rule focuses on ensuring IAM users do not have inline or attached policies.
Rule | IAM user should not have any inline or attached policies |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
Rule Description: IAM user should not have any inline or attached policies for NIST 800-53 Revision 5
Overview:
This rule ensures that IAM users do not have any inline or attached policies related to NIST 800-53 Revision 5. Inline or attached policies granting these permissions may potentially violate the security standards outlined in NIST 800-53 Revision 5.
Impact:
Having inline or attached policies corresponding to NIST 800-53 Revision 5 could lead to unauthorized access, data breaches, and non-compliance with security standards.
Troubleshooting Steps:
Remediation:
Remediating Inline Policies:
Remediating Attached Policies:
Compliance Reports:
To ensure ongoing compliance and monitoring, consider generating compliance reports periodically. These reports will identify any violations of the IAM user's inline or attached policies related to NIST 800-53 Revision 5. Use the AWS Config service to generate these reports and take necessary actions to remediate any violations promptly.