This rule ensures that IAM users with console access have MFA enabled.
Rule | IAM users with console access should have MFA enabled |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ High |
Rule Description:
This rule ensures that IAM users with console access have Multi-Factor Authentication (MFA) enabled. This is necessary to meet the security requirements of the FedRAMP Low Revision 4 guidelines. MFA adds an additional layer of security by requiring users to provide two or more credentials (typically a password and a unique code from a registered device) to access their AWS Management Console.
Troubleshooting Steps:
Verify IAM user's console access: Check if the IAM user in question has permission to access the AWS Management Console.
Confirm MFA configuration: Validate if MFA is already enabled for the IAM user account.
Check MFA device association: Ensure that the IAM user has associated an MFA device with their account.
Verify MFA device registration: Confirm if the MFA device associated with the IAM user account is properly registered and functional.
Necessary Codes:
No specific code is required for this rule. However, CLI commands may be useful for identifying and managing IAM users, their MFA settings, and associated devices.
Step-by-Step Guide for Remediation:
Identify the IAM user(s) with console access:
Check current MFA status for the IAM user:
Enable MFA for the IAM user:
Associate an MFA device with the IAM user:
Validate MFA device registration:
Repeat the above steps for all IAM users with console access, ensuring MFA is properly enabled.
Note:
It is important to note that following this rule helps to enhance the security of IAM users with console access by enabling MFA, which is a best practice.