This rule ensures that IAM root user hardware MFA is enabled for enhanced security measures.
Rule | IAM root user hardware MFA should be enabled |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Critical |
IAM Root User Hardware MFA Requirement for NIST 800-171 Revision 2
Rule Description
To comply with the NIST 800-171 Revision 2 security standard, it is necessary to enable Multi-Factor Authentication (MFA) for the root user in the AWS Identity and Access Management (IAM) service. Enabling hardware-based MFA for the root user ensures an additional layer of security and helps protect against unauthorized access to sensitive resources and data.
Troubleshooting Steps
If there are any issues encountered during the MFA setup, the following troubleshooting steps can be followed:
Necessary Codes
The following AWS CLI command can be used to enable hardware MFA for the root user:
aws iam enable-mfa-device --user-name <root-user-name> --authentication-code1 <code-one> --authentication-code2 <code-two> [--serial-number <serial-number>]
Step-by-Step Guide for Remediation
Note: If necessary, provide the
--serial-number
parameter in the AWS CLI command with the serial number of the MFA device.Conclusion
Enabling hardware MFA for the root user in AWS IAM is a fundamental step in meeting the NIST 800-171 Revision 2 security requirements. Following the provided troubleshooting steps and using the provided AWS CLI command can help ensure a secure and compliant environment.