More Info:

Root Account Usage should be monitored using CloudWatch alarms.

Risk Level

High

Address

Security

Compliance Standards

CISAWS, CBP, PCIDSS, SOC2, NIST, HIPAA, ISO27001, HITRUST, AWSWAF, NISTCSF

Triage and Remediation

Remediation

The Root Account Usage Alarm is an AWS Config Rule that checks whether the root account of your AWS account has been used within the last 90 days. If it has been used, it triggers an alarm. To remediate this issue, you can follow the below steps:

  1. Log in to the AWS Management Console.
  2. Go to the AWS Config service.
  3. Click on the Rules tab.
  4. Search for the Root Account Usage rule and click on it.
  5. Click on the Remediation action dropdown and select the “Remediate” option.
  6. In the Remediation action page, select the “Disable root user access keys” option.
  7. Click on the “Create remediation exception” checkbox.
  8. Click on the “Remediate” button to remediate the issue.

This will disable the root user access keys, which will prevent the root account from being used. The remediation exception will ensure that the rule does not trigger again for the same issue.

Additional Reading: