More Info:

AWS Console Sign-In Requests Without MFA should be monitored using CloudWatch Events.

Risk Level

Medium

Address

Security

Compliance Standards

CISAWSF, PCI, GDPR, APRA, MAS, NIST4, CISAWS, CBP, SOC2, HIPAA, ISO27001, HITRUST, NISTCSF, PCIDSS

Triage and Remediation

Remediation

To remediate “AWS Console Sign In Without MFA” using the AWS Console, follow these steps:

  1. Sign in to the AWS Management Console.

  2. Navigate to the CloudWatch dashboard.

  3. In the left navigation panel, select Logs.

  4. Select the log group created for your CloudTrail trail event logs and click Create Metric Filter.

  5. On the Define Logs Metric Filter page, paste the following pattern inside the Filter Pattern box:

    { $.eventName = "ConsoleLogin" && $.additionalEventData.MFAUsed = "No" }
  1. Review the metric filter details and click Assign Metric.

  2. On the Create Metric Filter and Assign a Metric page:

    • Filter Name: ConsoleSignInWithoutMfa
    • Metric Namespace: CloudTrailMetrics
    • Metric Name: ConsoleSignInWithoutMfaCount
    • Metric Value: 1
    • Click Create Filter.
  3. After creating the filter, click Create Alarm from the top-right menu.

  4. Configure the alarm:

    • Alarm Name: ConsoleSignInWithoutMfaAlarm
    • Threshold: >= 1 (to trigger on every sign-in without MFA)
    • Notification: Select the SNS topic to receive alerts.
    • Period: 5 Minutes
    • Statistic: Sum
  5. Review and click Create Alarm to finalize.

Additional Reading: