More Info:

Minimize or restrict principals which can modify infrastructure.

Risk Level

High

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the misconfiguration “Principals with Infrastructure modification capabilities” in AWS IAM using the AWS Management Console, follow these step-by-step instructions:

  1. Log in to the AWS Management Console (https://console.aws.amazon.com/).
  2. Navigate to the IAM service by searching for “IAM” in the AWS services search bar and selecting “IAM” from the results.
  3. In the IAM console, click on “Roles” in the left-hand menu.
  4. Review the list of roles and identify the roles that have infrastructure modification capabilities. These roles typically have policies attached that grant permissions to modify resources such as EC2 instances, S3 buckets, or VPC configurations.
  5. Click on the role that has the misconfiguration to view its details.
  6. In the “Permissions” tab, review the policies attached to the role. Look for policies that grant broad or excessive permissions related to infrastructure modification.
  7. Identify the specific actions or services that the role should not have access to modify and note them down for later reference.
  8. Click on the “Policy” name to view the policy document.
  9. In the policy document, locate the specific statements that grant the undesired infrastructure modification capabilities.
  10. Edit the policy document by removing or modifying the statements that grant the undesired permissions. Ensure that you only remove the necessary permissions to remediate the misconfiguration.
  11. After making the necessary changes, click on the “Review policy” button to validate the policy syntax and save the changes.
  12. Review the updated policy to ensure it aligns with the desired permissions and does not grant any unnecessary infrastructure modification capabilities.
  13. Repeat steps 5-12 for all roles that have the misconfiguration, ensuring that each role’s policy is appropriately modified.
  14. Once you have remediated all the roles, perform a thorough review to ensure that the roles now have the correct and desired permissions.
  15. Monitor the roles periodically to ensure that the misconfiguration does not reoccur and that any changes made align with the organization’s security and compliance requirements.

By following these steps, you can effectively remediate the misconfiguration “Principals with Infrastructure modification capabilities” in AWS IAM using the AWS Management Console.