Difference between AWS Config rules

0

We're in the process of using AWS Config and found two similar rules related to MFA:

We're wondering why the second rule (iam-user-mfa-enabled) exists in the first place.

Our understanding is that users without console access (meaning they don't have a password) don't need MFA because there's no way for them to actually login in the first place. If we have IAM users that only use access tokens (no password set) then the rule will be NON_COMPLIANT, but that's not entirely accurate since there's no way for them to actually use MFA.

Is there something we're missing here and so we should have both rules enabled? Can we ignore it and use only the first one?

1 Answer
2
Accepted Answer

Since MFA is required for console logins. The mfa-enabled-for-iam-console-access rule checks if MFA is enabled for users with console access, which is straightforward.

The iam-user-mfa-enabled rule, on the other hand, might be more comprehensive and could be aimed at ensuring that all IAM users, regardless of their access type, have MFA enabled for API calls. Even though MFA isn't used for access token-based users in the console, it's still a security best practice to have MFA enabled for all IAM users as a precautionary measure for any potential changes or privilege escalations.

profile pictureAWS
EXPERT
answered 9 months ago
profile picture
EXPERT
reviewed 9 months ago
profile picture
EXPERT
reviewed 9 months ago
profile pictureAWS
EXPERT
reviewed 9 months ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions