This rule focuses on enabling hardware MFA for IAM root user.
Rule | IAM root user hardware MFA should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Critical |
Rule Description:
The rule requires the root user of the AWS Identity and Access Management (IAM) to enable hardware Multi-Factor Authentication (MFA) as per the NIST 800-53 Revision 5 security controls. MFA adds an extra layer of security by requiring an additional form of authentication, in this case, a hardware device, in addition to the username and password.
Troubleshooting Steps (if required):
If MFA is not enabled for the root user, the following troubleshooting steps can be taken:
Necessary Code (if required):
No specific code is required for this rule.
Steps for Remediation:
To enable hardware MFA for the root user and comply with NIST 800-53 Revision 5 security controls, follow the steps below:
Step 1: Prepare the Hardware MFA Device
Step 2: Enable Hardware MFA for the Root User
Note: The specific steps for associating the hardware MFA device may vary depending on the device you are using. Please refer to the device manufacturer's documentation for detailed instructions.
Step 3: Test the Hardware MFA Configuration
Conclusion:
Enabling hardware Multi-Factor Authentication (MFA) for the root user is essential to meet the security requirements of NIST 800-53 Revision 5. By following the outlined steps, you can ensure that the root user has an additional layer of security, making it more challenging for unauthorized users to access your AWS account.