Policy: AWS > CIS v1 > 1 Identity and Access Management > 1.21 Do not setup access keys during initial user setup for all IAM users that have a console password (Not Scored)
Configures auditing against a CIS Benchmark item.
Level: 1 (Not Scored)
AWS console defaults the checkbox for creating access keys to enabled. This results in many access keys being generated unnecessarily. In addition to unnecessary credentials, it also generates unnecessary management work in auditing and rotating these keys.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- AWS > CIS v1
- AWS > CIS v1 > 1 Identity and Access Management > 1.21 Do not setup access keys during initial user setup for all IAM users that have a console password (Not Scored)
- AWS > CIS v1 > 1 Identity and Access Management
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/v0716
- tmod:@turbot/aws-cisv1#/policy/types/r0121
- turbot graphql policy-type --id "tmod:@turbot/aws-cisv1#/policy/types/r0121"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-cisv1#/policy/types/r0121"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI