Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: Ensure hardware MFA is enabled for the 'root' user account

This rule ensures hardware MFA is enabled for the 'root' user account.

RuleEnsure hardware MFA is enabled for the 'root' user account
Frameworkcis_v150
Severity
Medium

Rule Description:

This rule ensures that hardware Multi-Factor Authentication (MFA) is enabled for the 'root' user account. MFA adds an extra layer of security by requiring multiple forms of authentication to access the account. Enabling hardware MFA for the 'root' user is critical as the root account has full administrative access and controls the entire infrastructure.

Troubleshooting Steps:

If hardware MFA is not enabled for the 'root' user account, follow these steps to troubleshoot:

  1. 1.
    Check if the MFA device is properly configured and linked to the 'root' user account.
  2. 2.
    Ensure the MFA device has sufficient battery power and is within the range of the device.
  3. 3.
    Verify if the correct MFA method (e.g., physical key, fingerprint, smart card) is being used.
  4. 4.
    Check for any network connectivity issues that may prevent the MFA device from communicating with the authentication server.
  5. 5.
    Review the MFA device's documentation and troubleshooting guides provided by the manufacturer.

remediation:

To enable hardware MFA for the 'root' user account, follow these step-by-step instructions:

Method 1: AWS Management Console:

  1. 1.
    Login to the AWS Management Console using the root user credentials.
  2. 2.
    Go to the IAM service.
  3. 3.
    Select "Users" from the left navigation pane.
  4. 4.
    Locate and select the "root" user account.
  5. 5.
    In the "Security credentials" tab, click on "Manage" next to "Assigned MFA device".
  6. 6.
    Choose the appropriate hardware MFA device option (e.g., YubiKey, hardware token).
  7. 7.
    Follow the on-screen instructions to link the hardware MFA device to the root user account.
  8. 8.
    Test the MFA device to ensure it is working correctly.

Method 2: AWS Command Line Interface (CLI):

  1. 1.
    Install and configure the AWS CLI (if not already installed) by following the official documentation.
  2. 2.
    Open a command line interface or terminal.
  3. 3.
    Run the following command to enable hardware MFA for the 'root' user account:
    aws iam enable-mfa-device --user-name root --authentication-code1 <MFA_Code1> --serial-number <MFA_Device_Serial_Number>
    
    Replace
    <MFA_Code1>
    with the authentication code generated by your MFA device and
    <MFA_Device_Serial_Number>
    with the serial number of the MFA device.
  4. 4.
    Verify the output for any errors or confirmations.
  5. 5.
    Test the MFA device to ensure it is working correctly.

Note: Method 2 using the AWS CLI requires appropriate permissions and access to the AWS account.

Helpful Tips:

  • Regularly check the functionality of the hardware MFA device to ensure it is working correctly.
  • Always have a backup or alternate hardware MFA device registered in case of loss or damage to the primary device.
  • Educate the 'root' user and other users about the importance of hardware MFA and the risks associated with not using it.

By following the above instructions, you can enable hardware MFA for the 'root' user account, enhancing the security of your AWS environment.

Is your System Free of Underlying Vulnerabilities?
Find Out Now