Skip to main content

๐Ÿ’ผ IA-2(6) Identification and Authentication (organizational Users) | Access to Accounts โ€”separate Device

Descriptionโ€‹

Implement multi-factor authentication for [Selection (one or more): local; network; remote] access to [Selection (one or more): privileged accounts; non-privileged accounts] such that: (a) One of the factors is provided by a device separate from the system gaining access; and (b) The device meets [Assignment: organization-defined strength of mechanism requirements].

Similarโ€‹

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/iam/05
    • /frameworks/aws-fsbp-v1.0.0/iam/06
  • Internal
    • ID: dec-c-3e8bd6ae

Similar Sections (Take Policies From)โ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ AWS Foundational Security Best Practices v1.0.0 โ†’ ๐Ÿ’ผ [IAM.5] MFA should be enabled for all IAM users that have a console password1
๐Ÿ’ผ AWS Foundational Security Best Practices v1.0.0 โ†’ ๐Ÿ’ผ [IAM.6] Hardware MFA should be enabled for the root user1

Similar Sections (Give Policies To)โ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ IA-2(6) Access to Accounts โ€”separate Device (M)(H)2

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags

Policies (2)โ€‹

PolicyLogic CountFlags
๐Ÿ“ AWS Account Root User Hardware MFA is not enabled. ๐ŸŸข๐ŸŸข x3
๐Ÿ“ AWS IAM User MFA is not enabled for all users with console password ๐ŸŸข1๐ŸŸข x6