Skip to main content

💼 1.4 Ensure no 'root' user account access key exists (Automated)

  • Contextual name: 💼 1.4 Ensure no 'root' user account access key exists (Automated)
  • ID: /frameworks/cis-aws-v4.0.1/01/04
  • Located in: 💼 1 Identity and Access Management

Description

The 'root' user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the 'root' user account be deleted.

Similar

  • Sections
    • /frameworks/cis-aws-v5.0.0/01/03
    • /frameworks/cis-aws-v4.0.0/01/04

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v4.0.0 → 💼 1.4 Ensure no 'root' user account access key exists (Automated)1
💼 CIS AWS v5.0.0 → 💼 1.3 Ensure no 'root' user account access key exists (Automated)1

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v4.0.0 → 💼 1.4 Ensure no 'root' user account access key exists (Automated)1
💼 CIS AWS v5.0.0 → 💼 1.3 Ensure no 'root' user account access key exists (Automated)1

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS Account Root User has active access keys 🟢1🟢 x6