- AWS has managed to apply the MFA for 100% of root users
- The realization is an excellent advancement for the Cloud AWS platform
- More major security announcements have been made to Re: Inforce
Amazon Web Services (AWS) indicates that it has managed to obtain 100% of Root users to apply multi-factory authentication on all types of account.
The news represents an important step in the security posture, AWS fully meeting its commitment to apply the use of MFA for management and autonomous accounts with root access.
Information security manager Amy Herzog made the stage announcement at the AWS Re: company Inforce, declaring: “I am so happy to say that we now have 100% AMF application for root users.”
AWS continues voluntary commitments
As an achievement in itself, this is major, but what makes it even more impressive is that the milestone of the 100% root user account is one of the AWS voluntary commitments to the Cybersecurity and Infrastructure Safety Agency (CISA) secured by the design initiative.
Multi-faters’ authentication has become a key element in the safety structure of most organizations, offering a phishing-resistant verification method which can stop an attacker on their traces even if they have got hold of a stolen username and password.
However, it was not the only significant security announcement made on Re: Inforce – because AWS also announced a new important feature that was added to the identity management and access to platforms. In the access analyzer, you can now check which users have access to critical resources on a central dashboard.
The AWS Security Hub now offers notifications and signals classified by their importance to help security teams to face the most urgent problems first.
“For example, Security Hub can combine threats in several steps detected by the detection of prolonged care threats with other signals such as vulnerabilities, and prioritize critical security problems and help you simplify your global cloud safety operations throughout your organization,” said Herzog.
In addition, Guardduty Extended Threat Detection now provides support for applications based on containers executed on the Amazon Elastic Kubernetes service.
AWS SHIELD was also stimulated with a new network security director who is looking for configuration errors on the network that could be used during a distributed service in service, or SQL injection.