This rule ensures the Multi-Factor Authentication (MFA) is enabled for the IAM root user.
Rule | IAM root user MFA should be enabled |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ Medium |
Rule Description:
MFA (Multi-Factor Authentication) should be enabled for the root user in the context of FedRAMP Moderate Revision 4 compliance. This rule ensures an additional layer of security to protect the root user account from unauthorized access and helps comply with the security requirements defined by FedRAMP.
Troubleshooting Steps:
If MFA is not enabled for the root user, follow these troubleshooting steps:
Check if the root user has MFA enabled:
Enable MFA for the root user:
Verify MFA setup:
Necessary Codes:
There are no specific codes required for this rule. However, scripting or automation can be used to enforce this rule across multiple AWS accounts.
Remediation Steps:
To enable MFA for the root user, follow these steps:
Log in to the AWS Management Console using root user credentials.
Navigate to the IAM service.
Click on "Users" in the left-hand menu.
Look for the root user in the list and click on it.
Go to the "Security credentials" tab.
Under "Multi-factor authentication (MFA)", click on "Manage MFA".
Choose the appropriate MFA device option (Hardware MFA device or Virtual MFA device).
Follow the instructions provided to set up the MFA device.
Once the MFA device is set up, log out of the AWS Management Console.
Log back in using the root user credentials.
Provide the MFA token when prompted.
MFA should now be enabled for the root user.
CLI Command:
There is no specific CLI command required to enable MFA for the root user, as it needs to be done through the AWS Management Console.