2.4 Ensure no 'root' user account access key exists

Information

The 'root' user account is the most privileged user in an AWS account. AWS access keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the 'root' user account be deleted.

Deleting access keys associated with the 'root' user account limits the vectors by which the account can be compromised. Additionally, removing 'root' access keys encourages the use of role-based access with least privilege.

Solution

Perform the following to delete active 'root' user access keys.

From Console:

- Sign in to the AWS Management Console as 'root' and open the IAM console at https://console.aws.amazon.com/iam/
- Click on <root_account> at the top right and select Security Credentials from the drop down list
- Click on Access Keys (Access Key ID and Secret Access Key)
- If there are active keys:

- Deactivate the key under Status
- Click Delete (Deleted keys cannot be recovered)

Note : While a key can be made inactive, it will still appear in CLI audit output and may result in a false positive. Keys should be deleted to ensure compliance.

Impact:

Root access keys significantly increase the risk of account compromise, as they provide unrestricted programmatic access with no built-in scope limitations.

See Also

https://workbench.cisecurity.org/benchmarks/24575

Item Details

Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

References: 800-53|AC-2, 800-53|AC-3, 800-53|AC-6, 800-53|AC-6(1), 800-53|AC-6(2), 800-53|AC-6(5), 800-53|AC-6(7), 800-53|AU-9(4), CCE|CCE-78910-7, CSCv7|4.3

Plugin: amazon_aws

Control ID: 5314552c5f0a87dc97ec9f11cdf007a443fdf95c8aceca20a8953ba2811003e1