Get Involved
Query: IAM root user should not have access keys
Description
Access to systems and assets can be controlled by checking that the root user does not have access keys attached to their AWS Identity and Access Management (IAM) role.
Query
Tables used in this query:
Controls using this query:
- 1.12 Ensure no root account access key exists
- 1.4 Ensure no 'root' user account access key exists
- 1.4 Ensure no 'root' user account access key exists
- 1.4 Ensure no 'root' user account access key exists
- 1.4 Ensure no 'root' user account access key exists
- 1.4 Ensure no 'root' user account access key exists
- 1.4 Ensure no root user account access key exists
- 4 IAM root user access key should not exist
- IAM root user should not have access keys