Risk Level: Critical
Cloud Entity: IAM User
CloudGuard Rule ID: D9.AWS.IAM.19
Covered by Spectral: No
Category: Security, Identity, & Compliance
IamUser where name like '%root_account%' should have mfaType in('Hardware')
Note: to manage MFA devices for the root AWS account, you must use your root account credentials to sign in to AWS. You cannot manage MFA devices for the root account using other credentials.
- Login to AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/
- Choose Dashboard, and under Security Status, expand Activate MFA on your root account
- Choose Activate MFA
- In the wizard, choose A hardware MFA device and then choose Next Step
- In the Serial Number box, enter the serial number that is found on the back of the MFA device
- In the Authentication Code 1 box, enter the six-digit number displayed by the MFA device. You might need to press the button on the front of the device to display the number
- Wait 30 seconds while the device refreshes the code, and then enter the next six-digit number into the Authentication Code 2 box. You might need to press the button on the front of the device again to display the second number
- Choose Next Step. The MFA device is now associated with the AWS account. The next time you use your AWS account credentials to sign in, you must type a code from the hardware MFA device.
An IAM user is an entity that you create in AWS to represent the person or service that uses it to interact with AWS. A user in AWS consists of a name and credentials.
- AWS CIS Foundations v. 1.4.0
- AWS CIS Foundations v. 1.5.0
- AWS CloudGuard Best Practices
- CloudGuard AWS All Rules Ruleset
Updated 3 months ago