Policy: AWS > CIS v1 > 1 Identity and Access Management > 1.12 Ensure no root account access key exists (Scored)
Configures auditing against a CIS Benchmark item.
Level: 1 (Scored)
The root account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the root account be removed.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- AWS > CIS v1
- AWS > CIS v1 > 1 Identity and Access Management > 1.12 Ensure no root account access key exists (Scored)
- AWS > CIS v1 > 1 Identity and Access Management
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/v070403
- tmod:@turbot/aws-cisv1#/policy/types/r0112
- turbot graphql policy-type --id "tmod:@turbot/aws-cisv1#/policy/types/r0112"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-cisv1#/policy/types/r0112"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI