Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

IAM Users with Console Access Should Have MFA Enabled Rule

This rule ensures that IAM users with console access should have Multi-Factor Authentication (MFA) enabled.

RuleIAM users with console access should have MFA enabled
FrameworkFederal Financial Institutions Examination Council (FFIEC)
Severity
High

Policy Description:

This policy ensures that IAM users with console access within the organization have multi-factor authentication (MFA) enabled. It specifically targets users who are subject to compliance with the Federal Financial Institutions Examination Council (FFIEC) guidelines. MFA adds an extra layer of security to user accounts by requiring additional verification steps beyond a password.

Troubleshooting Steps (if applicable):

  1. 1.
    Check if the IAM user is subject to compliance with FFIEC guidelines.
  2. 2.
    Verify if MFA is already enabled for the user.
  3. 3.
    Ensure that the correct MFA device has been associated with the user account.
  4. 4.
    Check if the MFA device is functioning properly.
  5. 5.
    Review the IAM policy and check for any specific MFA-related restrictions or conditions that may be causing issues.

Necessary Code (if applicable):

No code is required for this policy. It is managed through the AWS Identity and Access Management (IAM) console.

Remediation Steps:

  1. 1.
    Log in to the AWS Management Console using an account with administrative privileges.
  2. 2.
    Open the IAM service from the services menu.
  3. 3.
    In the navigation pane, click on "Users" to view a list of IAM users.
  4. 4.
    Identify the user(s) who need to have MFA enabled.
  5. 5.
    Select the user(s) and click on the "Security credentials" tab in the details pane.
  6. 6.
    Under "Multi-factor authentication (MFA)", click on "Manage".
  7. 7.
    Choose the appropriate MFA device option - either "Virtual MFA device" (such as Google Authenticator) or "U2F security key".
  8. 8.
    Follow the on-screen instructions to associate the MFA device with the user account.
  9. 9.
    Test the MFA setup to ensure it is functioning properly.
  10. 10.
    Repeat these steps for any other IAM users who require MFA.

Note: Ensure that the MFA device is kept secure and the associated details are communicated securely to the user.

CLI Commands (if applicable):

There are no specific CLI commands required for this policy. MFA configuration is managed through the IAM console.

Is your System Free of Underlying Vulnerabilities?
Find Out Now