More Info:

Certificates tied with root accounts needs rotation.

Risk Level

Critical

Address

Security

Compliance Standards

NIST

Triage and Remediation

How to Prevent

To prevent the misconfiguration of not rotating root account certificates in AWS IAM using the AWS Management Console, follow these steps:

  1. Navigate to IAM Dashboard:

    • Sign in to the AWS Management Console.
    • In the top right corner, click on your account name or number, and then select “My Security Credentials.”
    • Alternatively, you can directly go to the IAM Dashboard by searching for “IAM” in the AWS Management Console search bar.
  2. Access Security Credentials:

    • On the IAM Dashboard, click on “Users” in the left-hand navigation pane.
    • Select the root account (usually indicated by the account email address).
  3. Review and Rotate Certificates:

    • Under the “Security credentials” tab, locate the “X.509 Certificates” section.
    • Review the existing certificates and their expiration dates.
    • If a certificate is nearing expiration or has been in use for an extended period, generate a new certificate by clicking on “Manage X.509 Certificates” and then “Create Certificate.”
  4. Implement a Rotation Policy:

    • Establish a regular schedule for rotating root account certificates, such as every 90 days.
    • Document the rotation process and ensure that it is followed consistently.
    • Use AWS CloudWatch or AWS Config to set up alerts and notifications for certificate expiration dates to ensure timely rotation.

By following these steps, you can ensure that root account certificates are regularly rotated, reducing the risk of security vulnerabilities associated with outdated or compromised certificates.

Additional Reading: