Root account credentials should be inactive for the previous 30 days

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Description

With the creation of an AWS account, a root user is created that cannot be disabled or deleted. That user has unrestricted access to and control over all resources in the AWS account. It is highly recommended that the use of this account be avoided for everyday tasks.

Rationale

The root user has unrestricted access to and control over all account resources. Use of it is inconsistent with the principles of least privilege and separation of duties, and can lead to unnecessary harm due to error or account compromise.

Remediation

If you find that the root user account is being used for daily activity and administrative tasks that do not require the root user, remediate this by doing the following:

  1. Change the root user password.
  2. Deactivate or delete access keys associated with the root user. Note: Anyone who has root user credentials for your AWS account has unrestricted access to and control of all the resources in your account, including billing information.

References

  1. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
  2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html
  3. https://docs.aws.amazon.com/general/latest/gr/aws_tasks-that-require-root.html

Additional Information: The root user for us-gov cloud regions is not enabled by default. However, on request AWS support can enable the root user and grant access only through access-keys (CLI, API methods) for us-gov cloud region. If the root user for us-gov cloud regions is enabled, this recommendation is applicable. Monitor usage of the root user by implementing recommendation 3.3 Ensure a log metric filter and alarm exist for usage of the root user.

PREVIEWING: esther/docs-9478-fix-split-after-example