This rule ensures enabling MFA for IAM root user for enhanced security measures.
Rule | IAM root user MFA should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Description:
According to the NIST 800-53 Revision 5 security standard, it is recommended that the root user in the AWS Identity and Access Management (IAM) should have Multi-Factor Authentication (MFA) enabled. MFA adds an extra layer of security to the root user's login process by requiring the use of a secondary authentication method, such as a hardware token or a mobile app, in addition to the regular password.
Enabling MFA for the root user ensures that even if someone gains unauthorized access to the root user's password, they will not be able to log in without the additional factor of authentication.
Troubleshooting:
If you encounter any issues while enabling MFA for the root user, you can follow these troubleshooting steps:
If the issue persists, consult the AWS documentation or reach out to AWS Support for further assistance.
Necessary Code:
No specific code is required for this rule.
Remediation:
To enable MFA for the root user in AWS IAM, follow these steps:
Note:
Enabling MFA for the root user enhances security for the AWS account and aligns with the NIST 800-53 Revision 5 guidelines. It is crucial to carefully manage the root user's credentials and ensure the MFA device is secured and accessible only to authorized individuals.