π AWS Account Root User has active access keys π’
- Contextual name: π Account Root User has active access keys π’
- ID:
/ce/ca/aws/iam/delete-root-user-access-keys
- Located in: π AWS IAM
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
- Internal
dec-x-0a7801fb
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-0a7801fb | 1 |
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
The root user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the root user account be deleted.
Rationaleβ
Deleting access keys associated with the root user account limits vectors by which the account can be compromised. Additionally, deleting the root access keys encourages the creation and use of role based accounts that are least privileged.
Auditβ
Perform the following to determine if the root user account has access keys:
From Consoleβ
- Login to the AWS Management Console.
- Click
Services
.- Click
IAM
.- Click on
Credential Report
.- This will download a
.csv
file which contains credential usage for all IAM users within an AWS Account - open this file.- For the
<root_account>
user, ensure theaccess_key_1_active
andaccess_key_2_active
fields are set toFALSE
.From Command Lineβ
Run the following command:
aws iam get-account-summary | grep "AccountAccessKeysPresent"
... [see more](description.md)
Remediationβ
Remediationβ
Perform the following to delete active
root
user access keys.From Consoleβ
- Sign in to the AWS Management Console as
root
and open the IAM console at https://console.aws.amazon.com/iam/.- Click on
<root_account>
at the top right and selectMy Security Credentials
from the drop down list.- On the pop out screen Click on
Continue to Security Credentials
.- Click on
Access Keys
(Access Key ID and Secret Access Key).- If there are active keys, under
Status
, clickDelete
(Note: Deleted keys cannot be recovered).Note: While a key can be made inactive, this inactive key will still show up in the CLI command from the audit procedure, and may lead to a key being falsely flagged as being non-compliant.