This rule ensures that the IAM root user does not have access keys for enhanced security.
Rule | IAM root user should not have access keys |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Medium |
Rule Description:
The rule states that the AWS Identity and Access Management (IAM) root user should not have any access keys configured for NIST Cybersecurity Framework (CSF) v1 compliance. The CSF v1 is a set of guidelines and best practices for enhancing the cybersecurity posture of organizations.
Having access keys for the root user can pose security risks as they grant unrestricted access to all resources in the AWS account. To ensure compliance with CSF v1, it is recommended to disable access keys for the root user.
Troubleshooting Steps:
If access keys for the root user are found, the following troubleshooting steps can be followed:
Remediation:
The remediation process involves disabling and deleting any existing access keys for the root user.
Method 1: Using the AWS Management Console
Method 2: Using AWS CLI
Replaceaws iam list-access-keys --user-name <root_user_name>
<root_user_name>
with the actual username of the root user.Replaceaws iam delete-access-key --access-key-id <access_key_id> --user-name <root_user_name>
<access_key_id>
with the actual Access Key ID and <root_user_name>
with the root user's username.Conclusion:
Disabling access keys for the IAM root user ensures compliance with the NIST Cybersecurity Framework (CSF) v1 by reducing the risk of unauthorized access to AWS resources. Following the provided step-by-step remediation guide using either the AWS Management Console or AWS CLI will help enforce this security measure.