💼 1.13 Ensure there is only one active access key available for any single IAM user
- ID:
/frameworks/cis-aws-v1.4.0/01/13
Description
Access keys are long-term credentials for an IAM user or the AWS account 'root' user. You can use access keys to sign programmatic requests to the AWS CLI or AWS API (directly or using the AWS SDK)
Similar
- Sections
/frameworks/cis-aws-v1.5.0/01/13/frameworks/cis-aws-v1.3.0/01/13
- Internal
- ID:
dec-c-33c11d24
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS AWS v1.3.0 → 💼 1.13 Ensure there is only one active access key available for any single IAM user | 1 | 1 | no data | ||
| 💼 CIS AWS v1.5.0 → 💼 1.13 Ensure there is only one active access key available for any single IAM user - Level 1 (Automated) | 1 | 1 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS AWS v1.3.0 → 💼 1.13 Ensure there is only one active access key available for any single IAM user | 1 | 1 | no data | ||
| 💼 CIS AWS v1.5.0 → 💼 1.13 Ensure there is only one active access key available for any single IAM user - Level 1 (Automated) | 1 | 1 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (1)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS IAM User has more than one active access key🟢 | 1 | 🟢 x6 | no data |
Internal Rules
| Rule | Policies | Flags |
|---|---|---|
| ✉️ dec-x-30795016 | 1 |