This rule states that IAM users with console access must have multi-factor authentication enabled to enhance security.
Rule | IAM users with console access should have MFA enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description:
This rule enforces that IAM users with console access must have Multi-Factor Authentication (MFA) enabled. The goal is to enhance the security of the AWS environment and adhere to the guidelines specified in NIST 800-53 Revision 5.
Troubleshooting Steps:
Verify IAM User Policies: Ensure that the IAM user policies for console access specify the requirement for MFA.
Check MFA Status: Verify if MFA is already enabled for the IAM users in question.
Review MFA Configuration: Ensure that the MFA devices are properly configured and associated with the IAM users.
Necessary Code:
There is no specific code required for this policy. However, you can use the AWS CLI or SDKs to manage IAM users and MFA settings.
Step-by-Step Guide for Remediation:
Open the AWS Management Console and navigate to the IAM service.
Select "Users" from the left navigation pane.
Identify the IAM user(s) that do not have MFA enabled.
Select the user(s) to enable MFA for.
Click on the "Security credentials" tab.
Under "Multi-factor authentication (MFA)", click on "Manage MFA".
Click on "Activate MFA".
Choose the appropriate MFA device option (either virtual MFA device or hardware MFA device) and follow the on-screen instructions to set it up.
Once the MFA device is configured, select the user(s) again.
Under "Multi-factor authentication (MFA)", click on "Manage MFA".
Click on "Assign MFA device".
Select the appropriate MFA device and complete the assignment process.
Repeat steps 5-12 for other IAM users without MFA enabled.
Test the MFA setup for the IAM users to ensure it is functioning correctly.
Conclusion:
Enabling MFA for IAM users with console access is crucial to comply with the NIST 800-53 Revision 5 guidelines and enhance the security of your AWS environment. Following the steps outlined above will help ensure that MFA is correctly enabled for the relevant IAM users.