Skip to main content

πŸ“ AWS Account Has No IAM Users πŸ”΄πŸŸ 

  • Contextual name: πŸ“ Account Has No IAM Users πŸ”΄πŸŸ 
  • ID: /ce/ca/aws/iam/account-has-no-iam-users
  • Located in: πŸ“ AWS IAM

Flags​

Logic​

Internal Notes πŸŸ β€‹

Open File

Policy description​

Origin of the policy​

This policy is based on CA policy ce:ca:aws:iam:account-has-no-users ce:ca:aws:iam

There are a lot of similar policies, like https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/IAM/iam-user-present.html

Does this policy make sense?​

Seems like the original intent of the policy was force customers to use "IAM Users" instead of "root" user.

And obvious hypothesis was:

If you don't have 0 IAM Users, you definitely have to use "root" user to do anything.

But then the second obvious question is:

What about IAM Roles? Can you have 0 IAM Users and still perform every task in AWS with no issue?

And seems like it is not only possible, but also currently preferred way:

https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#bp-users-federation-idp Security best practices in IAM

Considering this, we can try to look for accounts without IAM Users and without IAM Roles at the same time, but realistically there will be none. Only completely idle accounts that were created and abandoned immediately.

... see more

policy.yaml​

Open File