More Info:

KMS key policies should be designed to limit the number of users who can perform encrypt and decrypt operations. Each application should use its own key to avoid over exposure.

Risk Level

Low

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the misconfiguration of KMS Key Policies should be designed to limit the number of KMS Admins in AWS, follow the below steps using AWS Console:

  1. Open the AWS KMS Console.
  2. From the left navigation pane, choose “Customer managed keys”.
  3. Select the KMS key for which you want to remediate the misconfiguration.
  4. In the Key policy section, choose “Edit”.
  5. Update the key policy to include only the required number of IAM users or roles who need administrative access to the KMS key.
  6. Remove any unnecessary IAM users or roles from the key policy.
  7. Choose “Review policy”.
  8. Review the policy changes and ensure that the policy is designed to limit the number of KMS admins.
  9. Choose “Save changes” to save the updated key policy.
  10. Verify that only the required IAM users or roles have administrative access to the KMS key.

By following these steps, you can remediate the misconfiguration of KMS Key Policies should be designed to limit the number of KMS Admins in AWS.

Additional Reading: