This rule ensures that IAM policy does not grant full access to a specific service.
Rule | Ensure IAM policy should not grant full access to service |
Framework | RBI Cyber Security Framework |
Severity | ✔ Critical |
Rule Description:
The rule ensures that the IAM (Identity and Access Management) policy in the organization's environment does not grant full access to any service as per the RBI (Reserve Bank of India) Cyber Security Framework guidelines. This helps in minimizing the risk of unauthorized access and potential security breaches.
Troubleshooting Steps:
If any IAM policy is found to grant full access to a service, follow these troubleshooting steps:
Remediation Steps:
Follow these steps to remediate the IAM policy granting full access to a service:
Access the AWS Management Console or use the AWS CLI (Command Line Interface) for the following steps.
Identify the IAM policy that needs to be modified or removed.
Determine if the policy is attached to a user, group, or role.
If the policy is attached to a user:
aws iam list-attached-user-policies --user-name <user-name>
If the policy is attached to a group:
aws iam list-attached-group-policies --group-name <group-name>
If the policy is attached to a role:
aws iam list-attached-role-policies --role-name <role-name>
If the policy is found, modify it to adhere to the RBI Cyber Security Framework guidelines. Alternatively, remove the policy if it is unnecessary or grants excessive access.
To modify the policy, open the IAM Policy Editor or update the policy document programmatically.
In the policy, adjust the service permissions to align with the least privilege principle and the specific requirements of the RBI Cyber Security Framework.
Save the modified policy and ensure it no longer grants full access to the service(s).
If the policy was removed, ensure that the affected user/group/role has necessary permissions through other policies.
Perform thorough testing to verify that the modified policy does not hinder the expected functionality.
Keep track of policy changes and regularly review them to ensure ongoing compliance with the RBI Cyber Security Framework guidelines.
By following these steps, you can ensure that IAM policies do not grant full access to any service as required by the RBI Cyber Security Framework.