This rule ensures the IAM root user has hardware MFA enabled for added security.
Rule | IAM root user hardware MFA should be enabled |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Critical |
IAM Root User Hardware MFA Policy
Description
The IAM Root User Hardware MFA policy requires that Multi-Factor Authentication (MFA) using a hardware device is enabled for the root user in AWS Identity and Access Management (IAM). This policy is applicable for environments that need to comply with the Federal Risk and Authorization Management Program (FedRAMP) Low requirements Revision 4.
Enabling hardware MFA for the root user adds an additional layer of security to prevent unauthorized access and helps protect critical resources in your AWS account.
Troubleshooting Steps
If you encounter any issues during the setup or use of the IAM Root User Hardware MFA, follow these troubleshooting steps:
Code Example
The following code snippet illustrates how to enable hardware MFA for the root user in AWS IAM using the AWS Command Line Interface (CLI):
aws iam enable-mfa-device --user-name <root-user-name> --authentication-code1 <mfa-code-1> --authentication-code2 <mfa-code-2> --serial-number arn:aws:iam::<account-id>:mfa/<root-user-name>
Replace
<root-user-name>
with the actual name of the root user in IAM. <mfa-code-1>
and <mfa-code-2>
represent the authentication codes generated by the MFA device. <account-id>
should be replaced with the ID of your AWS account.Remediation Steps
Follow these step-by-step instructions to enable hardware MFA for the root user in AWS IAM:
Note: Make sure to securely store the backup codes and keep the MFA device in a safe place to avoid any potential security risks.
By following these steps, you will successfully enable hardware MFA for the root user in AWS IAM, meeting the requirements for FedRAMP Low Revision 4.