This rule states that IAM root user hardware MFA should be enabled.
Rule | IAM root user hardware MFA should be enabled |
Framework | CISA-cyber-essentials |
Severity | ✔ Critical |
IAM Root User Hardware MFA Policy
Description
The IAM (Identity and Access Management) root user is the most powerful user in an AWS account, having complete control over all resources. To ensure the highest level of security and prevent unauthorized access to the root user account, it is essential to enable hardware Multi-Factor Authentication (MFA). This policy focuses on enabling hardware MFA specifically for the CISA Cyber Essentials framework.
Troubleshooting Steps
If you encounter any issues while enabling hardware MFA for IAM root user, follow these troubleshooting steps:
Necessary Code
There is no specific code required for this policy. The hardware MFA configuration will be done through the AWS Management Console or AWS CLI.
Step-by-Step Guide for Remediation
To enable hardware MFA for the IAM root user in the AWS Management Console, follow these steps:
To enable hardware MFA for the IAM root user using the AWS CLI, follow these steps:
aws iam enable-mfa-device --user-name root --authentication-code-1 <code1> --authentication-code-2 <code2>
Replace
<code1>
and <code2>
with the authentication codes provided by the MFA device.Conclusion
Enabling hardware MFA for the IAM root user is crucial for securing your AWS account, especially when aligning with the CISA Cyber Essentials framework. By following the step-by-step guide and troubleshooting steps, you can ensure the proper implementation of this policy and enhance the overall security posture of your AWS infrastructure.