AWS has enhanced its security measures by requiring the use of multi-factor authentication (MFA) for root users in the AWS Management Console.
Enabling MFA is an effective way to prevent unauthorized users from gaining access to systems or data.
The typical workplace now has complex security boundaries, which have contributed to user passwords being the new weakness in the security perimeter.
AWS monitors online sources for compromised credentials, blocks the use of them on its platform, and guards against setting weak passwords or suggesting default passwords.
AWS launched support for FIDO2 passkeys as an MFA method to offer customers a highly secure but user-friendly way to align with security requirements.
Customers can now enable centralized root access, which enhances security and reduces the number of passwords they have to manage and operational overhead.
Beginning in Spring 2025, customers who have not enabled central management of root access will be required to use MFA for their AWS Organizations member account root users.
Customers are recommended to use centralized root access feature to experience reduced operational effort while maintaining strong controls.
AWS continue to expand its MFA requirements to member accounts in organizations and roll this change out gradually.
Customers can learn more about how to use MFA at AWS from AWS MFA in IAM User Guide.