Skip to main content

πŸ›‘οΈ AWS SageMaker Notebook Instance Root Access is not disabled🟒

  • Contextual name: πŸ›‘οΈ Notebook Instance Root Access is not disabled🟒
  • ID: /ce/ca/aws/sagemaker/disable-notebook-instance-root-access
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logic​

Similar Policies​

Description​

Open File

Description​

This policy identifies AWS SageMaker Notebook Instances that have Root Access enabled. When root access is enabled, notebook users are granted administrative privileges, allowing unrestricted access to the underlying operating system and file system.

Rationale​

By default, SageMaker notebook instances allow root access. While this can be convenient, it introduces increased security risk for the following reasons:

  1. Users can install unauthorized software or modify system-level configurations.
  2. If a notebook user’s credentials or session are compromised, an attacker could gain full administrative control over the instance.
  3. Root access can be used to bypass security controls or interfere with monitoring and logging mechanisms.

Disabling root access enforces the principle of least privilege, ensuring users have only the permissions required to perform their data science tasks.

Impact​

When root access is disabled, users cannot execute commands that require sudo. This may limit the ability to install system-level packages interactively. To address this, it is recommended to use Lifecycle Configurations to perform approved system setup and package installations in a controlled manner.

... see more

Remediation​

Open File

Remediation​

Disable Root Access for SageMaker Notebook Instances​

To remediate this finding, disable Root Access on the affected AWS SageMaker Notebook Instance. AWS requires the notebook instance to be stopped before modifying the root access configuration.

From Command Line​
  1. Stop the Notebook Instance

    aws sagemaker stop-notebook-instance \
    --notebook-instance-name {{notebook-instance-name}}
  2. Disable Root Access

    aws sagemaker update-notebook-instance \
    --notebook-instance-name {{notebook-instance-name}} \
    --root-access Disabled
  3. Restart the Notebook Instance

    aws sagemaker start-notebook-instance \
    --notebook-instance-name {{notebook-instance-name}}
Notes​
  • Disabling root access enforces the principle of least privilege and reduces the risk of unauthorized system-level changes.
  • If system-level packages or configurations are required, use Lifecycle Configurations to perform approved setup tasks in a controlled and auditable manner.

... see more

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [SageMaker.3] Users should not have root access to SageMaker AI notebook instances1no data
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό Secure Access70no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AC-2(1) Automated System Account Management (M)(H)25no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AC-6 Least Privilege (M)(H)81174no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H)16no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AC-6(10) Prohibit Non-privileged Users from Executing Privileged Functions (M)(H)15no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AC-2(1) Automated System Account Management (M)(H)25no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AC-6 Least Privilege (M)(H)674no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H)6no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AC-6(10) Prohibit Non-privileged Users from Executing Privileged Functions (M)(H)5no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties131no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-2(1) Account Management _ Automated System Account Management425no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-3(7) Access Enforcement _ Role-based Access Control29no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control20no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-6 Least Privilege102367no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-6(2) Least Privilege _ Non-privileged Access for Nonsecurity Functions46no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-6(10) Least Privilege _ Prohibit Non-privileged Users from Executing Privileged Functions4no data