This rule ensures Multi-Factor Authentication (MFA) is enabled specifically for the 'root' user account.
Rule | Ensure MFA is enabled for the 'root' user account |
Framework | cis_v140 |
Severity | ✔ High |
Ensure MFA is Enabled for the 'Root' User Account (CIS v1.4.0)
Description
Enabling Multi-Factor Authentication (MFA) adds an additional layer of security to your AWS account's root user. The root user has full access to all resources in the AWS account, and it is a best practice recommended by the Center for Internet Security (CIS) to protect it with MFA. MFA requires the user to present two or more different forms of evidence (factors) when logging in. The CIS AWS Foundations Benchmark v1.4.0 guideline stipulates that MFA should be enabled on the root account to prevent unauthorized access.
Troubleshooting Steps
If MFA is not enabled for your AWS root account, follow these steps:
Checking MFA Status
If MFA is not enabled, follow the remediation steps below.
Remediation Steps
Enabling MFA for AWS Root Account
CLI Commands (If Applicable)
Currently, there is no direct AWS CLI command available to enable MFA for the root user account. It must be done through the AWS Management Console.
Verification
After setting up MFA:
Ensure that MFA is correctly enabled and working by successfully logging in with both the password and MFA code.
Summary
Enabling MFA on your AWS root account is a critical security measure to prevent unauthorized access to your AWS resources. Following these remediation steps will help you comply with the CIS v1.4.0 guidelines and increase the security posture of your AWS account.