This rule states that IAM users with console access must have Multi-Factor Authentication (MFA) enabled.
Rule | IAM users with console access should have MFA enabled |
Framework | NIST 800-53 Revision 4 |
Severity | ✔ High |
Rule Description
According to the NIST 800-53 Revision 4 security guidelines, it is recommended to enable Multi-Factor Authentication (MFA) for IAM (Identity and Access Management) users with console access. This rule aims to enhance the security of user accounts by requiring an additional authentication factor, in addition to the username and password, to access the AWS Management Console.
Enabling MFA adds an extra layer of security, as it requires users to possess a physical device (such as a smartphone or hardware token) that generates temporary codes. These codes are then used along with the user's regular login credentials to authenticate their identity when accessing the AWS Management Console.
Troubleshooting Steps
If users with console access do not have MFA enabled, you can follow the troubleshooting steps below to resolve the issue.
Identify the IAM user(s) without MFA enabled:
Verify MFA devices for each user:
Enable MFA for the user:
Test MFA functionality:
Repeat the process for other users without MFA enabled:
Code Examples
There are no specific codes required to enable MFA for IAM users with console access. The procedure primarily involves using the AWS Management Console to configure and associate MFA devices for individual IAM users.
Remediation Steps
To remediate the non-compliant IAM users without MFA enabled, follow the step-by-step guide below:
Log in to the AWS Management Console with an account that has administrative privileges.
Open the IAM service.
Click on "Users" in the navigation pane to view the list of IAM users.
Select an IAM user without MFA enabled.
In the user's "Security credentials" tab, click on "Manage" next to Multi-Factor Authentication.
Follow the instructions provided by the AWS Management Console to associate an MFA device with the user.
If using a compatible MFA app, scan the QR code displayed on the screen.
If using a hardware token, enter the device's serial number.
Test the MFA functionality by logging out of the AWS Management Console.
Log back in using the IAM user's credentials.
Enter the generated MFA code from the associated device when prompted.
Repeat steps 4-11 for other users without MFA enabled.
By ensuring MFA is enabled for IAM users with console access, you comply with the recommended security guidelines from NIST 800-53 Revision 4.