As a security best practice, it is not recommended for the root user to have an access key. Per the AWS documentation https://docs.aws.amazon.com/accounts/latest/reference/credentials-access-keys-best-practices.html,
One of the best ways to protect your account is to not have access keys for your AWS account root user. Unless you must have root user access keys (which is rare), it is best not to generate them. Instead, the recommended best practice is to create one or more AWS Identity and Access Management (IAM) users. Grant those IAM users the necessary permissions, and use them for everyday interaction with AWS.
You'll still have access to your AWS account by using an IAM user. And, if you really need to access the AWS console using your root user, you can still do so by using your root user credentials (email and password). As a security best practice as well, ensure that you have an MFA configured for your root user credentials.
Deactivate or delete access keys for root userasked 2 months ago
Beginner cannot get root access to the AWS Command Line InterfaceAccepted Answerasked 4 months ago
Root User for Linuxasked 10 months ago
Recover Accidentally Deleted IAM User and Its Access Keysasked 2 months ago
Impossible to delete bucket policies even with root accountAccepted Answerasked 3 days ago
Unable to deactivate or delete CloudFront distributionasked 6 months ago
How can I delete a "hidden" SQSasked 7 months ago
How to delete AWS managed keysasked 3 years ago
how can i make s3 bucket make public for single iam user or root user or owner of bucketasked a month ago
Unable to delete cloudFront distribution despite being the ROOT userasked 12 days ago