Skip to main content

๐Ÿ›ก๏ธ AWS Account Root User signing certificates are active๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Root User signing certificates are active๐ŸŸข
  • ID: /ce/ca/aws/iam/delete-root-user-signing-certificates
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Similar Policiesโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

This policy identifies AWS account Root Users that have active X.509 signing certificates listed in the AWS IAM Credential Report.

To strengthen account security, AWS root users should not use X.509 certificates to perform SOAP-based requests to AWS services. X.509 certificates are signing credentials used to authenticate API requests by validating signatures generated with a corresponding private key. While some legacy AWS services support this authentication method, its use by the root user is strongly discouraged.

It is recommended disabling all X.509 certificates associated with the root account. The root user should be reserved strictly for account-level administrative tasks, not for routine operations or application development.

Rationaleโ€‹

Disabling X.509 signing certificates for the AWS root account reduces the risk of unauthorized access to AWS services and resources in the event that a private key is compromised, leaked, or shared unintentionally.

Auditโ€‹

This policy flags a Root User as INCOMPLIANT based on the cert_1_active and cert_2_active Credential Report attributes. If either attribute is set to true, the Root User is marked as INCOMPLIANT.

... see more

Remediationโ€‹

Open File

Remediationโ€‹

Disable X.509 Signing Certificates for the AWS Root Accountโ€‹

All active X.509 signing certificates associated with the AWS root user must be disabled and removed. The root user should not use X.509 certificates for API or SOAP-based requests.

From Command Lineโ€‹
1. Disable the Active X.509 Certificatesโ€‹

Identify the serial number of the active root signing certificate from the AWS Management Console or internal documentation, then deactivate it using the following command:

aws iam update-signing-certificate \
--certificate-id {{certificate-id}} \
--status Inactive \
--user-name root

Repeat this step for any additional active signing certificates.

2. Delete the X.509 Certificatesโ€‹

Ensure that no applications or legacy integrations rely on root X.509 certificates before deletion:

aws iam delete-signing-certificate \
--certificate-id {{certificate-id}} \
--user-name root

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ AWS Well-Architected โ†’ ๐Ÿ’ผ SEC01-BP02 Secure account root user and properties2no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Credential Lifecycle Management24no data