This rule ensures all IAM users with console access have multi-factor authentication enabled for enhanced security.
Rule | IAM users with console access should have MFA enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description
IAM users with console access should have Multi-Factor Authentication (MFA) enabled. This rule is in accordance with the NIST (National Institute of Standards and Technology) Special Publication 800-53 Revision 5 security standard. Enforcing MFA adds an additional layer of security to protect the user's credentials and prevent unauthorized access.
Troubleshooting Steps
If an IAM user does not have MFA enabled, follow these troubleshooting steps:
Check the IAM user's MFA status:
Enable MFA for the IAM user:
Test MFA configuration:
If the MFA setup fails, double-check the device association:
Code
There is no specific code provided as this rule requires manual configuration in the AWS Management Console.
Remediation Steps
To enable MFA for an IAM user, follow these step-by-step guides:
Open the AWS Management Console and sign in as an IAM user with administrative privileges.
Navigate to the IAM service.
In the sidebar, click on "Users".
Search and select the IAM user for whom you want to enable MFA.
In the "Security credentials" tab, locate the "Assigned MFA device" section and click on "Manage".
Select the appropriate MFA option:
Follow the on-screen instructions to set up the chosen MFA option. This may involve scanning a QR code, entering a serial number, or physical device configuration.
After completing the MFA setup, test the configuration:
Verify that MFA is working for the user by confirming successful login with the authentication code.
Following these steps will enforce MFA for the IAM user, ensuring compliance with the NIST 800-53 Revision 5 security standard.