Skip to main content

💼 1.11 Do not setup access keys during initial user setup for all IAM users that have a console password - Level 1 (Manual)

  • Contextual name: 💼 1.11 Do not setup access keys during initial user setup for all IAM users that have a console password - Level 1 (Manual)
  • ID: /frameworks/cis-aws-v2.0.0/01/11
  • Located in: 💼 1 Identity and Access Management

Description

AWS console defaults to no check boxes selected when creating a new IAM user. When creating the IAM User credentials you have to determine what type of access they require.

Programmatic access: The IAM user might need to make API calls, use the AWS CLI, or use the Tools for Windows PowerShell. In that case, create an access key (access key ID and a secret access key) for that user.

AWS Management Console access: If the user needs to access the AWS Management Console, create a password for the user.

Similar

  • Sections
    • /frameworks/cis-aws-v3.0.0/01/11
    • /frameworks/cis-aws-v1.5.0/01/11
  • Internal
    • ID: dec-c-e0b3f20c

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.5.0 → 💼 1.11 Do not setup access keys during initial user setup for all IAM users that have a console password - Level 1 (Automated)11
💼 CIS AWS v3.0.0 → 💼 1.11 Do not setup access keys during initial user setup for all IAM users that have a console password - Level 1 (Manual)11

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.5.0 → 💼 1.11 Do not setup access keys during initial user setup for all IAM users that have a console password - Level 1 (Automated)11
💼 CIS AWS v3.0.0 → 💼 1.11 Do not setup access keys during initial user setup for all IAM users that have a console password - Level 1 (Manual)11

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS IAM User with console and programmatic access set during the initial creation 🟢🟢 x3

Internal Rules

RulePoliciesFlags
✉️ dec-x-b10e98af1