This rule ensures that MFA is enabled for the IAM root user.
Rule | IAM root user MFA should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Description of the Rule
To ensure compliance with NIST 800-53 Revision 5 for IAM root user, Multi-Factor Authentication (MFA) should be enabled. The IAM root user has unrestricted access and control over all resources and services within an AWS account. Enabling MFA adds an extra layer of security to the root user's login process, requiring an additional verification step.
MFA is a security feature that combines something you know (password) with something you possess (MFA device) to verify your identity. By enabling MFA for the IAM root user, it becomes highly unlikely for unauthorized individuals to gain access to your AWS account.
Troubleshooting Steps (if applicable)
If MFA is not enabled for the IAM root user, the following troubleshooting steps can be followed:
Necessary Codes (if applicable)
No specific code is required for enabling MFA for the IAM root user. It can be done through the AWS Management Console or AWS CLI.
Step-by-Step Guide for Remediation:
Follow the step-by-step guide below to enable MFA for the IAM root user:
Congratulations! You have successfully enabled MFA for the IAM root user, aligning with the NIST 800-53 Revision 5 compliance requirement. This additional layer of security helps protect your AWS account from unauthorized access and reduces the risk of security breaches. Remember to securely store and maintain your MFA device to ensure continued access to your AWS account.