turbot/aws_compliance

Query: iam_root_user_no_access_keys

Usage

powerpipe query aws_compliance.query.iam_root_user_no_access_keys

Steampipe Tables

SQL

select
'arn:' || partition || ':::' || account_id as resource,
case
when account_access_keys_present > 0 then 'alarm'
else 'ok'
end status,
case
when account_access_keys_present > 0 then 'Root user access keys exist.'
else 'No root user access keys exist.'
end reason,
account_id
from
aws_iam_account_summary;

Controls

The query is being used by the following controls: