Two new security enhancements have been revealed by AWS. First, passkeys offer extra protection above and beyond a username and password by enabling multi-factor authentication (MFA) for root and IAM users. Second, beginning with the root user account within an AWS Organization, AWS now mandates MFA for root users. Throughout the year, additional accounts will be subject to this obligation.Two new security enhancements have been revealed by AWS. First, passkeys offer extra protection above and beyond a username and password by enabling multi-factor authentication (MFA) for root and IAM users. Second, beginning with the root user account within an AWS Organization, AWS now mandates MFA for root users. Throughout the year, additional accounts will be subject to this obligation.Two new security enhancements have been revealed by AWS. First, passkeys offer extra protection above and beyond a username and password by enabling multi-factor authentication (MFA) for root and IAM users. Second, beginning with the root user account within an AWS Organization, AWS now mandates MFA for root users. Throughout the year, additional accounts will be subject to this obligation.
This deployment has been done gradually by AWS, beginning with a small number of AWS Organizations management accounts and eventually extending to include the majority of accounts. When logging in, users who do not have MFA enabled on their root account will be prompted to do so. There is a grace period before MFA is required.
Users must go into the AWS interface and navigate to the IAM area in order to enable passkey MFA. Click “Assign MFA device” in the MFA section after choosing the desired user. It’s crucial to remember that giving a user access to numerous MFA devices might enhance their possibilities for account recovery.