This rule ensures that IAM users with console access must have multi-factor authentication (MFA) enabled for enhanced security.
Rule | IAM users with console access should have MFA enabled |
Framework | CISA-cyber-essentials |
Severity | ✔ High |
IAM User MFA Requirement for CISA-Cyber Essentials
1. Rule Description
This rule enforces the requirement that IAM (Identity and Access Management) users with console access must have Multi-Factor Authentication (MFA) enabled. MFA adds an additional layer of security by requiring users to provide two or more forms of identification to access their accounts. By enabling MFA, organizations adhere to the security guidelines outlined in CISA-Cyber Essentials.
2. Troubleshooting Steps
If there are issues or concerns related to this rule, follow these troubleshooting steps:
3. Necessary Codes
The following code is an IAM policy example that enforces MFA for all IAM users with console access:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "RequireMFAForConsoleAccess",
"Effect": "Deny",
"Action": "iam:*Console*",
"Resource": "*",
"Condition": {
"Bool": {
"aws:MultiFactorAuthPresent": "false"
}
}
}
]
}
Note: This code snippet denies any IAM action related to the console if MFA is not enabled.
4. Step-by-Step Guide for Remediation
Follow these steps to enforce MFA for IAM users with console access:
By following these steps, IAM users with console access will have MFA enabled, adhering to the CISA-Cyber Essentials security guidelines.