Profile Applicability:
- Level 1
Description:
This control ensures that AWS CloudTrail log data is monitored for Management Console sign-in attempts made without multi-factor authentication (MFA). A CloudWatch metric filter and corresponding alarm must be configured to detect and alert security teams when a user logs in to the AWS Management Console without MFA enabled. Monitoring this activity helps enforce strong authentication practices and protects against credential-based attacks.
Rationale:
MFA provides an additional layer of security beyond usernames and passwords. Detecting sign-ins without MFA ensures that users adhere to organizational security policies and helps identify accounts that may be vulnerable to unauthorized access. Monitoring these events supports compliance requirements and reduces the risk of account compromise due to stolen or weak credentials.
Impact:
- Positive Impact:Enhances account security by enforcing MFA use.Provides visibility into potential policy violations.Improves compliance with security frameworks requiring MFA (e.g., CIS, ISO 27001, SOC 2).
- Negative Impact:Slight increase in CloudWatch log ingestion and alerting costs.
Default Value:
By default, AWS does not provide a metric filter or alarm for console sign-ins without MFA. Manual setup is required.
Pre-Requisite:
CloudTrail must be enabled in all regions.
CloudTrail logs must be delivered to a CloudWatch Logs group.
IAM permissions required:
logs:PutMetricFilter
,cloudwatch:PutMetricAlarm
, andcloudwatch:DescribeAlarms
.
Remediation
Test Plan
Using AWS Console:
Sign in to the AWS Management Console.
Navigate to CloudWatch → Logs → Log groups.
Locate the CloudTrail log group (usually named
/aws/cloudtrail/...
).Select Create metric filter.
Assign a metric name such as
ConsoleSignInWithoutMFA
.Go to CloudWatch → Alarms → Create alarm.
Create an alarm for the
ConsoleSignInWithoutMFA
metric.Set a threshold (e.g., ≥ 1 occurrence within 5 minutes) and configure SNS notifications to alert the security team.
Save the configuration.
Implementation Plan
Using AWS Console:
Go to CloudWatch → Logs → Log groups.
Open the CloudTrail log group.
Choose Create metric filter
Set Metric Name:
ConsoleSignInWithoutMFA
.Create an Alarm:
Metric:
ConsoleSignInWithoutMFA
Namespace:
CISBenchmark
Condition: ≥ 1 in 5 minutes
Actions: Send notification to security team via SNS topic (e.g.,
aws-security-alerts
)
Save all configurations.
Backout Plan
Using AWS Console:
- Go to CloudWatch → Alarms.
- Select the
ConsoleSignInWithoutMFAAlarm
. - Choose Actions → Delete.
- Go to Logs → Metric Filters.
- Delete the
ConsoleSignInWithoutMFA
filter.
References: