Fernando Honig

Last Update 2 years ago

Description: Checks whether the AWS Identity and Access Management users have multi-factor authentication (MFA) enabled.

Trigger type: Periodic

AWS Region: All supported AWS regions

How to Resolve Manually

To resolve this manually, sign in to the AWS Management Console. Navigate to IAM. In the left menu, select Users.

Click on the IAM User that this rule is marking as NON_COMPLIANT and go to the Security Credentials tab.

In the Sign-In Credentials section, check the Assigned MFA device. Click on Manage and select the MFA device you want to assign to this user.

For more information about MFA Supported devices click here

Want to know more about StackZone and how to make your cloud management simple and secure?

Check our how it works section with easy to follow videos or just create your own StackZone Account here

Was this article helpful?

1 out of 1 liked this article

Still need help? Message Us