This rule ensures that IAM root user hardware MFA is enabled for added security.
Rule | IAM root user hardware MFA should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Critical |
Rule Description
This rule states that the root user in the IAM (Identity and Access Management) should have hardware MFA (Multi-Factor Authentication) enabled in order to comply with the security requirements outlined in the NIST (National Institute of Standards and Technology) 800-53 Revision 5.
Enabling hardware MFA for the root user adds an additional layer of security by requiring a physical device, such as a hardware token or smart card, in addition to the regular password when logging in as the root user. This helps prevent unauthorized access and strengthens the overall security posture of the AWS (Amazon Web Services) account.
Troubleshooting Steps
In case of any issues related to enabling hardware MFA for the IAM root user, you can follow these troubleshooting steps:
If the issue persists, you may need to contact AWS Support for further assistance.
Necessary Code
There is no specific code required for this rule. The enablement of hardware MFA for the IAM root user is done through the AWS Management Console or AWS CLI (Command Line Interface).
Step-by-Step Guide for Remediation
To enable hardware MFA for the IAM root user, follow these step-by-step instructions:
After completing these steps, hardware MFA will be enabled for the IAM root user, ensuring compliance with the NIST 800-53 Revision 5 requirement.
Remember to securely store the MFA device and keep it in a safe location to prevent unauthorized access.