This rule specifies that IAM root user hardware MFA must be enabled for enhanced security measures.
Rule | IAM root user hardware MFA should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Critical |
Rule Description:
For compliance with NIST 800-53 Revision 5, it is required to enable hardware Multi-Factor Authentication (MFA) for the root user in the AWS Identity and Access Management (IAM) service. This provides an additional layer of security by requiring the use of a physical device, such as a hardware token or security key, in addition to the root user's password.
Enabling hardware MFA for the root user ensures that only authorized individuals can access and manage critical AWS resources. By following this rule, you enhance the security posture of your AWS environment and comply with the NIST 800-53 Revision 5 security standard.
Troubleshooting Steps:
If you encounter any issues while enabling hardware MFA for the root user, follow these troubleshooting steps:
Necessary Code:
There is no specific code required for this rule, but the following AWS CLI commands can be used for enabling hardware MFA for the root user:
aws iam enable-mfa-device --user-name <root-user-name> --authentication-code1 <mfa-authentication-code1> --authentication-code2 <mfa-authentication-code2>
Replace
<root-user-name>
with the name of the root user and <mfa-authentication-code1>
and <mfa-authentication-code2>
with the codes generated by the MFA device.Remediation Steps:
Follow these steps to enable hardware MFA for the IAM root user:
Once hardware MFA is successfully enabled for the root user, it is recommended to securely store the MFA device and regularly review and update security credentials to ensure the highest level of security for your AWS resources.
Note: The above steps can also be performed using AWS CLI commands, as mentioned in the necessary code section above.
By following the provided troubleshooting steps, necessary code, and remediation steps, you can ensure hardware MFA is enabled for the root user, aligning with the requirements of NIST 800-53 Revision 5 and improving the security of your AWS environment.