Skip to main content

πŸ’Ό 1.4 Ensure no root user account access key exists

  • Contextual name: πŸ’Ό 1.4 Ensure no root user account access key exists
  • ID: /frameworks/cis-aws-v1.3.0/01/04
  • Located in: πŸ’Ό 1 Identity and Access Management

Description​

The root user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the root user account be removed.

Similar​

  • Sections
    • /frameworks/cis-aws-v1.4.0/01/04
    • /frameworks/cis-aws-v1.2.0/01/12
  • Internal
    • ID: dec-c-25046251

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v1.2.0 β†’ πŸ’Ό 1.12 Ensure no root account access key exists11
πŸ’Ό CIS AWS v1.4.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists11

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v1.2.0 β†’ πŸ’Ό 1.12 Ensure no root account access key exists11
πŸ’Ό CIS AWS v1.4.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists11

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-0a7801fb1