Control: IAM root user should not have access keys
Description
Access to systems and assets can be controlled by checking that the root user does not have access keys attached to their AWS Identity and Access Management (IAM) role.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.iam_root_user_no_access_keys
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.iam_root_user_no_access_keys --share
SQL
This control uses a named query:
select 'arn:' || partition || ':::' || account_id as resource, case when account_access_keys_present > 0 then 'alarm' else 'ok' end status, case when account_access_keys_present > 0 then 'Root user access keys exist.' else 'No root user access keys exist.' end reason , account_idfrom aws_iam_account_summary;