turbot/steampipe-mod-aws-compliance

Control: IAM root user should not have access keys

Description

Access to systems and assets can be controlled by checking that the root user does not have access keys attached to their AWS Identity and Access Management (IAM) role.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.iam_root_user_no_access_keys

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.iam_root_user_no_access_keys --share

SQL

This control uses a named query:

select
'arn:' || partition || ':::' || account_id as resource,
case
when account_access_keys_present > 0 then 'alarm'
else 'ok'
end status,
case
when account_access_keys_present > 0 then 'Root user access keys exist.'
else 'No root user access keys exist.'
end reason
, account_id
from
aws_iam_account_summary;

Tags