IAM Root User How to protect Root User


IAM (Identity and Access Management) is a core AWS service and that helps with access control to various AWS resources. Resources can be the entities like S3 bucket, RDS database, etc. IAM performs both authentication and authorisation for resources. AWS supports fine-grained access controls and IAM should be appropriately used to set the security permissions to achieve least privileged access.

Root User

The root user is the first user that is automatically configured when you open an AWS account. The root user will exist until you close the account. The root user can be used for both console and CLI access (by using access keys). Note, it is not recommended to use root user for day-to-day operation. You should enable MFA for root user and disable or delete any access keys.

You need to use the root user for account setup related activities, billing modification, support upgrades. These cannot be performed by other IAM users.

Best Practice to Protect Root User

The root user is important. If it is leaked, essentially, access to your entire AWS account is leaked. The root user can make any modification, delete resources and even close the account. Protecting the root user is super important.


AWS IAM