Root account access keys should be removed
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Description
The root account is the most privileged user in an AWS account. AWS Access Keys provide programmatic access to a given AWS account. It is recommended that all access keys associated with the root account be removed.
Rationale
Removing access keys associated with the root account limits vectors by which the account can be compromised. Additionally, removing the root access keys encourages the creation and use of role based accounts that are least privileged.
From the console
- Sign in to the AWS Management Console as ‘root’ and open the IAM console at https://console.aws.amazon.com/iam/.
- Click <Root_Account_Name> at the top right and select My Security Credentials from the drop-down list.
- In the pop-up, click Continue to Security Credentials.
- Click Access Keys (Access Key ID and Secret Access Key).
- Under the Status column, if there are any keys that are in the active state, either:
- Click Make Inactive - (Temporarily disables key - may require it again)
- Click Delete - (Deleted keys cannot be recovered)
References
- http://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.html
- http://docs.aws.amazon.com/general/latest/gr/managing-aws-access-keys.html
- http://docs.aws.amazon.com/IAM/latest/APIReference/API_GetAccountSummary.html
- https://aws.amazon.com/blogs/security/an-easier-way-to-determine-the-presence-of-aws-account-access-keys/
Additional Information: IAM User account “root” for us-gov cloud regions is not enabled by default. However, on request to AWS support enables root access only through access-keys (CLI, API methods) for us-gov cloud region.