Skip to main content

💼 1.4 Ensure no 'root' user account access key exists

  • Contextual name: 💼 1.4 Ensure no 'root' user account access key exists
  • ID: /frameworks/cis-aws-v1.4.0/01/04
  • Located in: 💼 1 Identity and Access Management

Description

The 'root' user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the 'root' user account be removed.

Similar

  • Sections
    • /frameworks/cis-aws-v1.5.0/01/04
    • /frameworks/cis-aws-v1.3.0/01/04
  • Internal
    • ID: dec-c-835727e6

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.3.0 → 💼 1.4 Ensure no root user account access key exists11
💼 CIS AWS v1.5.0 → 💼 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated)11

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.3.0 → 💼 1.4 Ensure no root user account access key exists11
💼 CIS AWS v1.5.0 → 💼 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated)11

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS Account Root User has active access keys 🟢1🟢 x6

Internal Rules

RulePoliciesFlags
✉️ dec-x-0a7801fb1