More Info:

IAM users should not have Inline policies. It is recommended that IAM policies be applied directly to groups and roles but not users.

Risk Level

Low

Address

Security

Compliance Standards

HIPAA, GDPR, CISAWS, CBP, NIST, SOC2, PCIDSS, HITRUST, NISTCSF

Triage and Remediation

How to Prevent

To prevent users from having inline policies in AWS IAM using the AWS Management Console, follow these steps:

  1. Navigate to IAM Dashboard:

    • Sign in to the AWS Management Console.
    • In the navigation bar, select “Services” and then choose “IAM” to open the IAM dashboard.
  2. Review User Policies:

    • In the IAM dashboard, select “Users” from the navigation pane.
    • Click on each user to review their permissions.
    • Under the “Permissions” tab, check for any inline policies attached directly to the user.
  3. Remove Inline Policies:

    • For each user with an inline policy, click on the “Inline Policies” section.
    • Select the inline policy and choose “Delete Policy” to remove it.
  4. Use Managed Policies:

    • Instead of using inline policies, attach AWS managed policies or create and attach customer-managed policies.
    • Go to the “Permissions” tab for each user, click “Add permissions,” and then choose “Attach policies directly.”
    • Select the appropriate managed policies and click “Next: Review” and then “Add permissions.”

By following these steps, you can ensure that users do not have inline policies, promoting better policy management and security practices.

Additional Reading: