Skip to main content

πŸ’Ό 1.4 Ensure no 'root' user account access key exists

  • Contextual name: πŸ’Ό 1.4 Ensure no 'root' user account access key exists
  • ID: /frameworks/cis-aws-v1.4.0/01/04
  • Located in: πŸ’Ό 1 Identity and Access Management

Description​

The 'root' user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the 'root' user account be removed.

Similar​

  • Sections
    • /frameworks/cis-aws-v1.5.0/01/04
    • /frameworks/cis-aws-v1.3.0/01/04
  • Internal
    • ID: dec-c-835727e6

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v1.3.0 β†’ πŸ’Ό 1.4 Ensure no root user account access key exists11
πŸ’Ό CIS AWS v1.5.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated)11

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v1.3.0 β†’ πŸ’Ό 1.4 Ensure no root user account access key exists11
πŸ’Ό CIS AWS v1.5.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated)11

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-0a7801fb1