Skip to main content

💼 1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

  • Contextual name: 💼 1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password
  • ID: /frameworks/cis-aws-v1.3.0/01/10
  • Located in: 💼 1 Identity and Access Management

Description

Multi-Factor Authentication (MFA) adds an extra layer of authentication assurance beyond traditional credentials. With MFA enabled, when a user signs in to the AWS Console, they will be prompted for their user name and password as well as for an authentication code from their physical or virtual MFA token. It is recommended that MFA be enabled for all accounts that have a console password.

Similar

  • Sections
    • /frameworks/cis-aws-v1.4.0/01/10
    • /frameworks/cis-aws-v1.2.0/01/02
  • Internal
    • ID: dec-c-8123116b

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.2.0 → 💼 1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password1
💼 CIS AWS v1.4.0 → 💼 1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password1

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.2.0 → 💼 1.2 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password1
💼 CIS AWS v1.4.0 → 💼 1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password1

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS IAM User MFA is not enabled for all users with console password 🟢1🟢 x6