/
Root Account Activity
Root Account Activity
Root accounts have a lot of power. They can access any AWS resource for an account with practically no restrictions. Given this, they should never be used after their initial inception from the account creation. In addition to their prevented usage, security maintenance should be performed. Multi-factor authentication is essential as an added protection. Along with MFA, access keys should be created, which consists of two values, an access key ID and a secret access key. These values are generated by AWS and rotation of the values every few months is critical to prevent misuse. More information can be found here:
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html
, multiple selections available,
Related content
Login Bypassing SAML
Login Bypassing SAML
Read with this
High Volume/Denied API Activity
High Volume/Denied API Activity
More like this
Cloud Security Monitoring
Cloud Security Monitoring
Read with this
Short Lived Accounts
Short Lived Accounts
More like this
AWS Security Alerts
AWS Security Alerts
Read with this
IAM Policy Changes
IAM Policy Changes
More like this