You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Multi-factor authentication adds a critical layer of security to your AWS identities. Even if a password or access key is compromised, MFA ensures that the attacker cannot gain access without the second authentication factor.
MFA is a security mechanism that requires two or more independent forms of verification before granting access. The factors typically fall into three categories:
| Factor Type | Description | Example |
|---|---|---|
| Something you know | A secret only you know | Password, PIN |
| Something you have | A physical device you possess | Phone, hardware token, security key |
| Something you are | A biometric characteristic | Fingerprint, facial recognition |
In AWS, MFA combines your password (something you know) with a one-time code from a device (something you have). This means an attacker who steals your password still cannot access your account without also having your MFA device.
Consider the consequences of a compromised AWS account:
MFA dramatically reduces the risk of these scenarios. AWS recommends enabling MFA for all IAM users, and it is mandatory for the root user as a security best practice.
AWS supports several types of MFA devices:
Software applications that generate time-based one-time passwords (TOTP). Popular options include:
These apps generate a new six-digit code every 30 seconds. When you sign in, you enter your password plus the current code from the app.
Pros: Free, easy to set up, no hardware needed. Cons: If the device is lost or wiped, you lose access (keep backup codes).
Physical hardware devices that support the FIDO2/WebAuthn standard. You plug them into a USB port or tap them against an NFC-enabled device.
Examples:
Pros: Phishing-resistant, no codes to type, very secure. Cons: Costs money, easy to lose physically.
Physical devices that display a TOTP code on a small screen. These are dedicated MFA devices — they do nothing else.
Example: Gemalto token (available from AWS).
Pros: Dedicated device, not vulnerable to phone-based attacks. Cons: Costs money, less convenient than a phone app.
Enabling MFA on the root user is the single most important security step you can take after creating an AWS account.
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.