Skip to main content

πŸ’Ό 1.4 Ensure no 'root' user account access key exists (Automated)

  • Contextual name: πŸ’Ό 1.4 Ensure no 'root' user account access key exists (Automated)
  • ID: /frameworks/cis-aws-v4.0.1/01/04
  • Located in: πŸ’Ό 1 Identity and Access Management

Description​

The 'root' user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the 'root' user account be deleted.

Similar​

  • Sections
    • /frameworks/cis-aws-v5.0.0/01/03
    • /frameworks/cis-aws-v4.0.0/01/04

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v4.0.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists (Automated)1
πŸ’Ό CIS AWS v5.0.0 β†’ πŸ’Ό 1.3 Ensure no 'root' user account access key exists (Automated)1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v4.0.0 β†’ πŸ’Ό 1.4 Ensure no 'root' user account access key exists (Automated)1
πŸ’Ό CIS AWS v5.0.0 β†’ πŸ’Ό 1.3 Ensure no 'root' user account access key exists (Automated)1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6