More Info:

Administrator access also brings risk with them. Try to have minimum admins in your account.

Risk Level

High

Address

Security

Compliance Standards

CISGCP,HIPAA,SCO2,NISTCSF,NIST,AWSWAF,ISO27001,HITRUST

Triage and Remediation

Remediation

To remediate the misconfiguration of having users with Administrator Access in AWS IAM, follow these steps using the AWS Management Console:

  1. Sign in to the AWS Management Console using your root account credentials.

  2. Open the IAM console by searching for “IAM” in the AWS services search bar and selecting “IAM - Identity and Access Management.”

  3. In the left navigation pane, click on “Users.”

  4. Review the list of users and identify the ones with Administrator Access. These users will have the policy “AdministratorAccess” attached to them.

  5. Select the user with Administrator Access that you want to remediate by clicking on their username.

  6. In the “Permissions” tab, click on the “Detach Policy” button next to the “AdministratorAccess” policy.

  7. A confirmation dialog box will appear. Click on the “Detach” button to remove the policy from the user.

  8. Repeat steps 5-7 for each user with Administrator Access until all users no longer have the “AdministratorAccess” policy attached.

  9. To prevent future misconfigurations, it is recommended to follow the principle of least privilege and assign appropriate permissions to users based on their roles and responsibilities.

  10. To do this, create custom IAM policies with specific permissions that align with each user’s requirements and attach these policies to the respective users.

  11. To create a custom IAM policy, go back to the IAM console and click on “Policies” in the left navigation pane.

  12. Click on the “Create policy” button.

  13. Choose either the “JSON” or “Visual editor” tab to define your policy. The “Visual editor” provides a guided interface to create the policy, while the “JSON” tab allows you to write the policy in JSON format.

  14. Define the permissions for the policy based on the user’s requirements. It is recommended to follow the principle of least privilege and only grant the necessary permissions.

  15. Once the policy is defined, click on the “Review policy” button.

  16. Provide a name and description for the policy, and then click on the “Create policy” button.

  17. After creating the policy, go back to the “Users” section and select the user you want to assign the policy to.

  18. In the “Permissions” tab of the user, click on the “Attach policies” button.

  19. In the search bar, type the name of the policy you created and select it from the list.

  20. Click on the “Attach policy” button to assign the policy to the user.

  21. Repeat steps 17-20 for each user, assigning the appropriate custom policies based on their roles and responsibilities.

By following these steps, you can remediate the misconfiguration of having users with Administrator Access in AWS IAM and implement the principle of least privilege by assigning custom policies based on specific user requirements.