Profile Applicability:
Level 1
Description:
This control ensures that an AWS IAM role exists for securely managing support cases and incident response with AWS Support. The support role allows authorized personnel to engage with AWS Support engineers during operational issues, outages, or security incidents without requiring the root account or privileged administrator credentials. This promotes secure, auditable, and least-privilege access to AWS Support resources.
Rationale:
Creating a dedicated AWS Support role enables organizations to maintain a secure and structured process for engaging AWS Support. This ensures that only authorized incident responders or administrators can interact with AWS Support and perform support-related actions. It aligns with security best practices by avoiding use of the root account and limiting permissions to the AWS Support APIs. Having a designated support role also facilitates faster and safer handling of critical incidents, audits, and escalations.
Impact:
Positive Impact:
Improves operational security by eliminating the need to use the root account for support tasks.
Ensures clear accountability and auditability for AWS Support interactions.
Enables efficient and authorized management of incidents and support tickets.
Negative Impact:Requires IAM role creation and assignment to specific personnel.
May need coordination across multiple accounts in an AWS Organization.
Default Value:
By default, AWS does not create a Support role. It must be explicitly created by an administrator or through AWS Organizations using the provided AWS-managed policy.
Pre-Requisite:
IAM permissions required:
iam:CreateRole,iam:AttachRolePolicy,organizations:EnableAWSServiceAccess,organizations:RegisterDelegatedAdministrator.AWS Support plan (Business or Enterprise) must be active to open and manage support cases.
Test Plan
Using AWS Console:
Sign in to the AWS Management Console as an administrator.
Navigate to IAM → Roles.
Search for a role named AWSServiceRoleForSupport or AWSSupportAccess.
Verify that:
A support role exists (typically named
AWSSupportAccessorAWSIncidentResponseSupportRole).The role has the AWS managed policy
AWSSupportAccessattached.
Review the Trust relationships to ensure that the appropriate accounts or incident response users can assume the role.
If no such role exists, this control is non-compliant.
Implementation Plan
Using AWS Console:
Sign in to the AWS Management Console with administrative privileges.
Navigate to IAM → Roles → Create role.
Choose AWS account as the trusted entity type.
Under Permissions policies, attach the AWS managed policy
AWSSupportAccess.(Optional) Restrict trust relationships to specific AWS accounts or IAM users responsible for incident management.
Name the role, for example: AWSIncidentResponseSupportRole.
Review and create the role.
(Optional) If managing multiple AWS accounts under an AWS Organization, use AWS CloudFormation StackSets or Service Control Policies (SCPs) to deploy the same role across accounts for centralized management.
Backout Plan:
If the newly created role causes access conflicts or is no longer required, navigate to IAM → Roles → [Role Name] → Delete role.
Before deletion, ensure no automation, users, or incidents depend on this role for AWS Support interaction.
Retain the previous IAM structure or create a new restricted role for future use.
References: