Skip to content

Commit 73fc6bd

Browse files
authored
Merge pull request #16 from secyed/patch-3
Update README.md
2 parents afab66f + 67c25d4 commit 73fc6bd

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

Privileged-access-controls/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Enforce controls to make sure that your roles and applications are given only privileges which are essential to perform their intended function.
44

5-
| Included Policy | Rational |
5+
| Included Policy | Rationale |
66
|------|-------------|
77
|[Prevent root credentials management in member accounts in AWS Organizations.](Prevent-root-credentials-management-in-member-accounts-in-AWS-Organizations.json) | Centrally manage root access for member accounts in [AWS Organizations](https://aws.amazon.com/organizations/). Only allow management account sessions to be able to perform actions on root credentials. Note: An SCP restricts permissions for IAM users and roles in member accounts, including the member account's root user. SCPs have no effect on users or roles in the management account.|
88
|[Deny the root user from performing actions other than modification to S3 bucket policy](Deny-the-root-user-from-performing-actions-except-S3-bucketpolicy-changes.json)| Consider configuring an administrative user in [AWS IAM Identity Center (successor to AWS Single Sign-On)](https://docs.aws.amazon.com/singlesignon/latest/userguide/getting-started.html) to perform daily tasks. Restrict use of root user with exceptions for S3 bucket policy changes, if you are frequently locked out of S3 buckets. Refer to [Tasks that require root user credentials](https://docs.aws.amazon.com/accounts/latest/reference/root-user-tasks.html)|

0 commit comments

Comments
 (0)