Skip to main content

πŸ’Ό 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated)

  • Contextual name: πŸ’Ό 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated)
  • ID: /frameworks/cis-aws-v3.0.0/01/04
  • Located in: πŸ’Ό 1 Identity and Access Management

Description​

The 'root' user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the 'root' user account be deleted.

Similar​

  • Sections
    • /frameworks/cis-aws-v4.0.0/01/04
    • /frameworks/cis-aws-v2.0.0/01/04
  • Internal
    • ID: dec-c-54953e21

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v2.0.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated)11
πŸ’Ό CIS AWS v4.0.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists (Automated)1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v2.0.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated)11
πŸ’Ό CIS AWS v4.0.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists (Automated)1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-0a7801fb1