Skip to main content

💼 1.4 Ensure no root user account access key exists

  • Contextual name: 💼 1.4 Ensure no root user account access key exists
  • ID: /frameworks/cis-aws-v1.3.0/01/04
  • Located in: 💼 1 Identity and Access Management

Description

The root user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the root user account be removed.

Similar

  • Sections
    • /frameworks/cis-aws-v1.4.0/01/04
    • /frameworks/cis-aws-v1.2.0/01/12
  • Internal
    • ID: dec-c-25046251

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.2.0 → 💼 1.12 Ensure no root account access key exists11
💼 CIS AWS v1.4.0 → 💼 1.4 Ensure no 'root' user account access key exists11

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.2.0 → 💼 1.12 Ensure no root account access key exists11
💼 CIS AWS v1.4.0 → 💼 1.4 Ensure no 'root' user account access key exists11

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS Account Root User has active access keys 🟢1🟢 x6

Internal Rules

RulePoliciesFlags
✉️ dec-x-0a7801fb1