Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
AWS
Loading controls...

Control: AWS > PCI v3.2.1 > IAM > 2 IAM users should not have IAM policies attached

This control checks that none of your IAM users have policies attached. IAM users must inherit permissions from IAM groups or roles.

It does not check whether least privileged policies are applied to IAM roles and groups.

Remediation

To resolve this issue, do the following:

1. Create an IAM group 2. Assign the policy to the group 3. Add the users to the group

The policy is applied to each user in the group.

To create an IAM group

1. Open the IAM console. 2. Choose Groups and then choose Create New Group. 3. Enter a name for the group to create and then choose Next Step. 4. Select each policy to assign to the group and then choose Next Step. 5. The policies that you choose should include any policies currently attached directly to a user account. The next step to resolve a failed check is to add users to a group and then assign the policies to that group. 6. Each user in the group gets assigned the policies assigned to the group. 7. Confirm the details on the Review page and then choose Create Group.

To add users to an IAM group

1. Open the IAM console. 2. Choose Groups. 3. Choose Group Actions and then choose Add Users to Group. 4. Choose the users to add to the group and then choose Add Users.

To remove a policy attached directly to a user

1. Open the IAM console. 2. Choose Users. 3. For the user to detach a policy from, in the User name column, choose the name. 4. For each policy listed under Attached directly, to remove the policy from the user, choose the X on the right side of the page and then choose Remove. 5. Confirm that the user can still use AWS services as expected.

PCI requirement(s): 7.2.1

Resource Types

This control targets the following resource types:

  • AWS > IAM > User

Policies

This control type relies on these other policies when running actions:

  • AWS > PCI v3.2.1

Category

  • Compliance > PCI

In Your Workspace

  • Controls by Resource report
  • Controls by Control Type report

Developers

    Control Type URI
    • tmod:@turbot/aws-pciv3-2-1#/control/types/iamUserNoInlineAttachedPolicies
  • Category URI
    • tmod:@turbot/turbot#/control/categories/compliancePci
  • GraphQL
    • query controlType(id: "tmod:@turbot/aws-pciv3-2-1#/control/types/iamUserNoInlineAttachedPolicies") { … }
    • query controls(filter: "controlTypeId:'tmod:@turbot/aws-pciv3-2-1#/control/types/iamUserNoInlineAttachedPolicies'") { … }
  • CLI
    • Get Controls
    • turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-pciv3-2-1#/control/types/iamUserNoInlineAttachedPolicies"
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
180
Mods
497
Resource Types
8,691
Policies
3,362
Controls
1,833
Quick Actions
540
IAM