Skip to Content

Getting Started with Security: AWS IAM Best Practices to Secure the Root User Account

Learn the critical best practices for managing the root user account in AWS Identity and Access Management (IAM) to strengthen your cloud security posture.

Table of Contents

Question

Which is a best practice in IAM concerning the root user?

A. Do not use root account credentials for day-to-day interactions with AWS.
B. Do not enable MFA for the root user.
C. Use the root user for daily administration tasks.
D. Share the root user account login credentials with at least one other administrator.

Answer

A. Do not use root account credentials for day-to-day interactions with AWS.

Explanation

AWS highly recommends that you do not use root account credentials for day-to-day interactions with AWS.

Sharing the root user credentials and not enabling MFA are contrary to the best practices regarding the root user account.

The root user in an AWS account has unrestricted access to all resources and services within that account. As a best practice, the root user credentials should not be used for everyday tasks and interactions with AWS. Instead, the root user should only be used for a limited set of tasks that absolutely require root privileges, such as:

  • Changing account settings
  • Modifying or closing the AWS account
  • Changing AWS support plans
  • Registering as a seller in the Reserved Instance Marketplace

For regular administrative duties, it is recommended to create separate IAM users with specific permissions tailored to their roles and responsibilities. This follows the principle of least privilege, granting only the minimum permissions necessary for users to perform their jobs.

The other options listed are poor security practices:

B. Enabling multi-factor authentication (MFA) for the root user is strongly recommended to add an extra layer of protection.

C. The root user should not be used for daily administration tasks. IAM users should be created for this purpose.

D. Root user credentials should never be shared. Only authorized individuals who absolutely require root access should have them, with strong safeguards in place.

By restricting root user access and adopting these best practices, organizations can significantly enhance the security of their AWS environments and reduce the risk of accidental or malicious misuse of privileges.

Getting Started with Security EDSECUv1EN-US assessment question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Getting Started with Security EDSECUv1EN-US assessment and earn Getting Started with Security EDSECUv1EN-US badge.