Skip to main content

💼 [KMS.2] IAM principals should not have IAM inline policies that allow decryption actions on all KMS keys

  • ID: /frameworks/aws-fsbp-v1.0.0/kms/02

Description

With AWS KMS, you control who can use your KMS keys and gain access to your encrypted data. IAM policies define which actions an identity (user, group, or role) can perform on which resources. Following security best practices, AWS recommends that you allow least privilege. In other words, you should grant to identities only the permissions they need and only for keys that are required to perform a task. Otherwise, the user might use keys that are not appropriate for your data.

Similar

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST SP 800-53 Revision 5 → 💼 AC-2 Account Management132057no data
💼 NIST SP 800-53 Revision 5 → 💼 AC-2(1) Account Management _ Automated System Account Management432no data
💼 NIST SP 800-53 Revision 5 → 💼 AC-3 Access Enforcement15565no data
💼 NIST SP 800-53 Revision 5 → 💼 AC-3(7) Access Enforcement _ Role-based Access Control36no data
💼 NIST SP 800-53 Revision 5 → 💼 AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control27no data
💼 NIST SP 800-53 Revision 5 → 💼 AC-5 Separation of Duties22no data
💼 NIST SP 800-53 Revision 5 → 💼 AC-6 Least Privilege102378no data
💼 NIST SP 800-53 Revision 5 → 💼 AC-6(3) Least Privilege _ Network Access to Privileged Commands6no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (3)

PolicyLogic CountFlagsCompliance
🛡️ AWS IAM Group Inline Policy allows KMS decryption actions on all KMS keys🟢1🟢 x6no data
🛡️ AWS IAM Role Inline Policy allows KMS decryption actions on all KMS keys🟢1🟢 x6no data
🛡️ AWS IAM User Inline Policy allows KMS decryption actions on all KMS keys🟢1🟢 x6no data