Control: AWS > CIS v5.0 > 1 - Identity and Access Management > 1.03 - Ensure no 'root' user account access key exists
Configures auditing against a CIS Benchmark item.
Level: 1
The 'root' user account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the 'root' user account be deleted.
Resource Types
This control targets the following resource types:
Policies
This control type relies on these other policies when running actions:
- AWS > CIS v5.0
- AWS > CIS v5.0 > 1 - Identity and Access Management > 1.03 - Ensure no 'root' user account access key exists
- AWS > CIS v5.0 > 1 - Identity and Access Management
Category
In Your Workspace
Developers
- tmod:@turbot/aws-cisv5-0#/control/types/r0103
- tmod:@turbot/cis#/control/categories/v070403
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-cisv5-0#/control/types/r0103"
Get Controls
Control Type URI
Category URI
GraphQL
CLI