๐ก๏ธ AWS Account Root User signing certificates are active๐ข
- Contextual name: ๐ก๏ธ Root User signing certificates are active๐ข
- ID:
/ce/ca/aws/iam/delete-root-user-signing-certificates - Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Similar Policiesโ
- Cloud Conformity: Root Account Active Signing Certificates
Descriptionโ
Descriptionโ
This policy identifies AWS account Root Users that have active X.509 signing certificates listed in the AWS IAM Credential Report.
To strengthen account security, AWS root users should not use X.509 certificates to perform SOAP-based requests to AWS services. X.509 certificates are signing credentials used to authenticate API requests by validating signatures generated with a corresponding private key. While some legacy AWS services support this authentication method, its use by the root user is strongly discouraged.
It is recommended disabling all X.509 certificates associated with the root account. The root user should be reserved strictly for account-level administrative tasks, not for routine operations or application development.
Rationaleโ
Disabling X.509 signing certificates for the AWS root account reduces the risk of unauthorized access to AWS services and resources in the event that a private key is compromised, leaked, or shared unintentionally.
Auditโ
This policy flags a Root User as
INCOMPLIANTbased on the cert_1_active and cert_2_activeCredential Reportattributes. If either attribute is set to true, the Root User is marked asINCOMPLIANT.... see more
Remediationโ
Remediationโ
Disable X.509 Signing Certificates for the AWS Root Accountโ
All active X.509 signing certificates associated with the AWS root user must be disabled and removed. The root user should not use X.509 certificates for API or SOAP-based requests.
From Command Lineโ
1. Disable the Active X.509 Certificatesโ
Identify the serial number of the active root signing certificate from the AWS Management Console or internal documentation, then deactivate it using the following command:
aws iam update-signing-certificate \
--certificate-id {{certificate-id}} \
--status Inactive \
--user-name rootRepeat this step for any additional active signing certificates.
2. Delete the X.509 Certificatesโ
Ensure that no applications or legacy integrations rely on root X.509 certificates before deletion:
aws iam delete-signing-certificate \
--certificate-id {{certificate-id}} \
--user-name root
policy.yamlโ
Linked Framework Sectionsโ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| ๐ผ AWS Well-Architected โ ๐ผ SEC01-BP02 Secure account root user and properties | 2 | no data | |||
| ๐ผ Cloudaware Framework โ ๐ผ Credential Lifecycle Management | 24 | no data |