Skip to content

Latest commit

 

History

History
25 lines (21 loc) · 1.79 KB

no-user-iam-policies.md

File metadata and controls

25 lines (21 loc) · 1.79 KB

CloudSploit

AWS / IAM / No User IAM Policies

Quick Info

Plugin Title No User IAM Policies
Cloud AWS
Category IAM
Description Ensures IAM policies are not connected directly to IAM users
More Info To reduce management complexity, IAM permissions should only be assigned to roles and groups. Users can then be added to those groups. Policies should not be applied directly to a user.
AWS Link http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#use-groups-for-permissions
Recommended Action Create groups with the required policies, move the IAM users to the applicable groups, and then remove the inline and directly attached policies from the IAM user.

Detailed Remediation Steps

  1. Log in to the AWS Management Console.
  2. Select the "Services" option and search for IAM.
  3. Scroll down the left navigation panel and select "Users" under "Access management".
  4. Click on the IAM User name that you want to inspect.
  5. Scroll down on the IAM user configuration page and click on the "Permissions" tab.
  6. Ensure that there are no policies "Attached directly".
  7. If there are any policies "Attached directly" then they should be removed and assigned through either a group or role.
  8. Repeat steps 4 – 7 for all IAM users.