Steampipe MCP Server →
Steampipe Hub 
Hub
  • Plugins
  • Mods
  • Docs
  • Home
PluginsModsDocsHome
Plugins
turbot/aws
GitHub Repo Stars
Overview
527
Tables
2,601
Queries
PowerpipeModsGitHub
steampipe plugin install awssteampipe plugin install aws
Loading...
Get Involved
Edit on GitHubDiscuss on Slack

Query: IAM root user should not have access keys

Description

Access to systems and assets can be controlled by checking that the root user does not have access keys attached to their AWS Identity and Access Management (IAM) role.

Query

Tables used in this query:

  • aws_iam_account_summary

Controls using this query:

  • 1.12 Ensure no root account access key exists
  • 1.3 Ensure no 'root' user account access key exists
  • 1.4 Ensure no 'root' user account access key exists
  • 1.4 Ensure no 'root' user account access key exists
  • 1.4 Ensure no 'root' user account access key exists
  • 1.4 Ensure no 'root' user account access key exists
  • 1.4 Ensure no 'root' user account access key exists
  • 1.4 Ensure no root user account access key exists
  • 4 IAM root user access key should not exist
  • IAM root user should not have access keys

SQL

Steampipe
Steampipe
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of 2,900+ practitioners love to discuss Steampipe, cloud intelligence & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy