Security

CSO

AWS is pushing ahead with MFA for privileged accounts. What that means for you ...

The clock is ticking – why not try a passkey?


Heads up: Amazon Web Services is pushing ahead with making multi-factor authentication (MFA) mandatory for certain users, and we love to see it.

The cloud giant in October said it would start requiring MFA for its customers' most privileged users in 2024.

Indeed, we understand that since May this year, AWS has been gradually requiring MFA for management account root users in AWS Organizations, and this change is still rolling out.

And as stated during its annual re:Inforce security conference this month, AWS will from July begin requiring MFA for standalone account root users – those outside of AWS Organizations – when signing in to the AWS Management Console. Again, this will be a gradual roll-out, and other root user types are due to start facing this security requirement later this year. 

Once MFA is required for their account, customers will have a 30-day grace period to turn on multi-factor auth, Arynn Crow, AWS senior manager for user authentication product, told The Register, adding that the IT giant considers "MFA such an incredibly important part of our customer security strategy."

Especially in the post-COVID years, "we've observed an increase in credential-based attacks, particularly credential stuffing, credential spraying, and brute-force type of attacks," Crow said. "MFA is the single, simple, most effective tool that people have that they can deploy against these types of attacks."

If MFA is required, and not enabled within the grace period, the customer must register their MFA during their next sign-in or will not be able to proceed further.

For anyone who thinks MFA is an avoidable faff: May we suggest the recent Snowflake customer security breaches as proof. These include Pure Storage, Ticketmaster, and Santander bank – and more than 160 other companies that are wishing they had turned on MFA right about now.

According to Mandiant, the 165-plus orgs whose Snowflake databases were stolen – and then they were extorted by an unknown financially motivated crime crew – had one thing in common: they hadn't enabled MFA

"Of course, it's not the only tool that should be in your toolkit from a security perspective," Crow told The Register in an interview at re:Inforce. "But by and large, the most commonly increasing ones that we see are ones that MFA can actually mitigate and help enhance the security posture of your account."

The support for FIDO2 passkeys as an MFA method, also announced at the conference, should make it simple for AWS customers, she added.

Passkeys are based on a FIDO Alliance standard that's supported by Big Tech – including AWS, Apple, Microsoft, and Google – and they essentially replace passwords by using biometrics such as face or fingerprints, or device PINs, to verify users' identity.

By adding passkey support, AWS customers can now use Apple Touch ID on their iPhones, or Windows Hello on their laptops, as an authenticator – and then use that same passkey as an MFA method to sign in to their AWS console across multiple devices.

"I'm really excited about this particular milestone, because this is a usable, accessible form of security where we don't really have to trade off against that user experience anymore to have good security hygiene," Crow said. 

The move to passkeys follows similar efforts by Microsoft and Google over the past couple of months. It also builds on promises made at last month's RSA Conference by the three cloud giants, along with some of the other biggest names in tech, to make their products more secure within a year. ®

Send us news
17 Comments

AWS unveils cloud security IR service for a mere $7K a month

Tap into the infinite scalability... of pricing

Crooks stole AWS credentials from misconfigured sites then kept them in open S3 bucket

ShinyHunters-linked heist thought to have been ongoing since March

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

AWS now renting monster HPE servers, even in clusters of 7,680-vCPUs and 128TB

Heir to Superdome goes cloudy for those who run large in-memory databases and apps that need them

BlackBerry offloads Cylance's endpoint security products to Arctic Wolf

Fresh attempt to mix the perfect cocktail of IoT and Infosec

US reportedly mulls TP-Link router ban over national security risk

It could end up like Huawei -Trump's gonna get ya, get ya, get ya

Blocking Chinese spies from intercepting calls? There ought to be a law

Sen. Wyden blasts FCC's 'failure' amid Salt Typhoon hacks

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

AWS says AI could disrupt everything – and hopes it will do just that to Windows

Cloud colossus reckons it can clarify hallucinations, get your apps off Microsoft's OS at pleasing speed

Australia moves to drop some cryptography by 2030 – before quantum carves it up

The likes of SHA-256, RSA, ECDSA and ECDH won't be welcome in just five years

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?