- Newest
- Most votes
- Most comments
It sounds like you're dealing with a protected SSO role that can't be deleted through normal IAM procedures. The "AWSReservedSSO_AdministratorAccess" role is a special role created and managed by AWS for IAM Identity Center (formerly AWS SSO) functionality.
This role can only be deleted through the IAM Identity Center service, not directly through the IAM console. Since you mentioned you can't access IAM Identity Center, this creates the circular problem you're experiencing.
Here's what you can try:
-
Log in as the root user and try to access the IAM Identity Center console directly (https://console.aws.amazon.com/singlesignon).
-
If you can access IAM Identity Center, look for any permission sets or assignments that might be using this role and delete those first.
-
If you can't access IAM Identity Center, be very specific with AWS Support about the error message you're receiving when trying to delete the role. Ask them to guide you through accessing IAM Identity Center or to escalate your case to someone who can help with protected roles.
-
Request that AWS Support help you disable IAM Identity Center if you're not using it, which should remove the associated roles.
-
Be clear with AWS Support that this is a security issue related to a compromised account, which might help prioritize your case.
Since you've already secured your root account with MFA and removed other IAM users, you've taken good initial steps. Continue to monitor your account for any unauthorized activity and consider reviewing your AWS billing for any unexpected charges that might indicate ongoing unauthorized usage.
Sources
Security Hub - IAM.9 MFA should be enabled for the root user - finding | AWS re:Post
Secure root user access for member accounts in AWS Organizations | AWS Security Blog
AWSReservedSSO_* IAM Roles are provisioned by an AWS Service called "IAM Identity Center (formerly AWS SSO)". Roles created by IAM IC can only be modified and deleted by IAM IC. You can browse to IAM Identity Center (formerly AWS SSO).
- If you have access to IAM IC, try to delete the account through there. If the bad actor restricted your access to IAM Identity Center (formerly AWS SSO), then try logging into your account with the root credentials and try to remove the role.
- It's also possible that the bad actor joined your account to an AWS Organization and then provisioned the IAM Role into your account from another account, in which case you will not have access to IAM Identity Center (formerly AWS SSO). In this case you will need to open a security related ticket with them. Depending on your monthly AWS spend you could also look into this https://aws.amazon.com/security-incident-response/pricing/
This role is automatically created and managed by AWS IAM Identity Center (formerly AWS SSO), and cannot be deleted from IAM manually, even by the root user. The only way to remove it is to delete or deprovision IAM Identity Center.
Be clear: That you cannot delete the role because it's managed by IAM Identity Center. (To the AWS Support Team)
Alternatively: disable Identity Center yourself (if UI access is available) Go to: IAM Identity Center → Settings → Delete Configuration
If your account lets you access this page, deleting the configuration will automatically remove the AWSReservedSSO_AdministratorAccess_* roles.
But since you said IAM Identity Center and Organizations are locked down or inaccessible, support escalation is your best option.
Relevant content
- asked 8 months ago
- asked 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 6 months ago
