💼 1.4 Ensure no 'root' user account access key exists
- Contextual name: 💼 1.4 Ensure no 'root' user account access key exists
- ID:
/frameworks/cis-aws-v1.4.0/01/04
- Located in: 💼 1 Identity and Access Management
Description
The 'root' user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the 'root' user account be removed.
Similar
- Sections
/frameworks/cis-aws-v1.5.0/01/04
/frameworks/cis-aws-v1.3.0/01/04
- Internal
- ID:
dec-c-835727e6
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 CIS AWS v1.3.0 → 💼 1.4 Ensure no root user account access key exists | 1 | 1 | ||
💼 CIS AWS v1.5.0 → 💼 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated) | 1 | 1 |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 CIS AWS v1.3.0 → 💼 1.4 Ensure no root user account access key exists | 1 | 1 | ||
💼 CIS AWS v1.5.0 → 💼 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated) | 1 | 1 |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (1)
Policy | Logic Count | Flags |
---|---|---|
📝 AWS Account Root User has active access keys 🟢 | 1 | 🟢 x6 |
Internal Rules
Rule | Policies | Flags |
---|---|---|
✉️ dec-x-0a7801fb | 1 |