Policy: AWS > CIS v2.0 > 1 - Identity and Access Management > 1.07 - Eliminate use of the 'root' user for administrative and daily tasks
Configures auditing against a CIS Benchmark item.
Level: 1
With the creation of an AWS account, a 'root user' is created that cannot be disabled or deleted. That user has unrestricted access to and control over all resources in the AWS account. It is highly recommended that the use of this account be avoided for everyday tasks.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- AWS > CIS v2.0
- AWS > CIS v2.0 > 1 - Identity and Access Management > 1.07 - Eliminate use of the 'root' user for administrative and daily tasks
- AWS > CIS v2.0 > 1 - Identity and Access Management
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/v070403
- tmod:@turbot/aws-cisv2-0#/policy/types/r0107
- turbot graphql policy-type --id "tmod:@turbot/aws-cisv2-0#/policy/types/r0107"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-cisv2-0#/policy/types/r0107"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI