Control: IAM root user should not have access keys
Description
Access to systems and assets can be controlled by checking that the root user does not have access keys attached to their AWS Identity and Access Management (IAM) role.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.iam_root_user_no_access_keys
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.iam_root_user_no_access_keys --share
SQL
This control uses a named query:
iam_root_user_no_access_keys