Sha256: 071d651f474ebe9ea08d60752e327a79bc87e4fd8636603e5d5df505a61ca7d0
Contents?: true
Size: 1.54 KB
Versions: 4
Compression:
Stored size: 1.54 KB
Contents
--- title: About the aws_iam_root_user Resource platform: aws --- # aws\_iam\_root\_user Use the `aws_iam_root_user` InSpec audit resource to test properties of the root user (owner of the account). To test properties of all or multiple users, use the `aws_iam_users` resource. To test properties of a specific AWS user use the `aws_iam_user` resource. <br> ## Syntax An `aws_iam_root_user` resource block requires no parameters but has several matchers describe aws_iam_root_user do its { should have_mfa_enabled } end <br> ## Examples The following examples show how to use this InSpec audit resource. ### Test that the AWS root account has at-least one access key describe aws_iam_root_user do it { should have_access_key } end ### Test that the AWS root account has Multi-Factor Authentication enabled describe aws_iam_root_user do it { should have_mfa_enabled } end <br> ## Matchers This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/). ### have\_mfa\_enabled The `have_mfa_enabled` matcher tests if the AWS root user has Multi-Factor Authentication enabled, requiring them to enter a secondary code when they login to the web console. it { should have_mfa_enabled } ### have\_access\_key The `have_access_key` matcher tests if the AWS root user has at least one access key. it { should have_access_key }
Version data entries
4 entries across 4 versions & 1 rubygems