Skip to main content

💼 1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

  • Contextual name: 💼 1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
  • ID: /frameworks/cis-aws-v1.2.0/01/02
  • Located in: 💼 1 Identity and Access Management

Description

Multi-Factor Authentication (MFA) adds an extra layer of protection on top of a user name and password. With MFA enabled, when a user signs in to an AWS website, they will be prompted for their user name and password as well as for an authentication code from their AWS MFA device. It is recommended that MFA be enabled for all accounts that have a console password.

Similar

  • Sections
    • /frameworks/cis-aws-v1.3.0/01/10
  • Internal
    • ID: dec-c-22317ce0

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.3.0 → 💼 1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password1

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.3.0 → 💼 1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password1

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS IAM User MFA is not enabled for all users with console password 🟢1🟢 x6