This rule ensures that IAM root user hardware MFA is enabled for security purposes.
Rule | IAM root user hardware MFA should be enabled |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Critical |
IAM Root User Hardware MFA Enablement for NIST CSF v1 Compliance
The NIST Cybersecurity Framework (CSF) provides a policy framework of computer security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyber attacks. Implementing hardware Multi-Factor Authentication (MFA) for IAM root users is an essential element in meeting the NIST CSF requirements.
Understanding the Requirement
Enabling hardware MFA for the IAM root user in AWS provides an additional layer of security above and beyond standard password protection. This is critical as the root user has full access to all resources in the AWS account.
To align with NIST CSF v1, MFA should be:
Detailed Description of the Rule
Troubleshooting Steps
If enabling MFA is unsuccessful, perform the following checks:
Necessary Codes
No specific code is necessary as enabling hardware MFA is a manual process through the AWS Management Console. However, the AWS CLI can be used for verification purposes:
aws iam list-mfa-devices --user-name <root_user_name>
Replace
<root_user_name>
with the applicable AWS root account username to list MFA devices.Step by Step Guide for Remediation
Enabling Hardware MFA:
Verification:
After setting up MFA, you may want to verify that the hardware MFA device is indeed enabled:
Necessary CLI Commands
For verification purposes, you can use:
aws iam list-mfa-devices --user-name <root_user_name>
Make sure to replace
<root_user_name>
with your IAM root user's actual name to retrieve details about the MFA devices.