- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
The root
user account is the most privileged user in an AWS account. MFA adds an extra layer of protection on top of a username and password. When a user signs in to an AWS website that has MFA enabled, they are prompted for their username and password, as well as an authentication code from their AWS MFA device. For Level 2, it is recommended that the root
user account be protected with a hardware MFA.
A hardware MFA has a smaller attack surface than a virtual MFA. For example, a hardware MFA does not suffer the attack surface introduced by the mobile smartphone on which a virtual MFA resides. Note: Using a single hardware MFA for large numbers of AWS accounts may create a logistical device management issue. If this is the case, consider implementing the Level 2 recommendation selectively to the highest security AWS accounts and the Level 1 recommendation to the remaining accounts.
Complete the following task to establish a hardware MFA for the ‘root’ user account:
root
account credentials to sign in to AWS. You cannot manage MFA devices for the ‘root’ account using other credentials.Dashboard
, and then under Security Status
, expand Activate MFA
on your root account.Serial Number
box, enter the serial number that is found on the back of the MFA device.Authentication Code 1
box, enter the six-digit number displayed by the MFA device. You might need to press the button on the front of the device to display the number.Authentication Code 2
box. You might need to press the button on the front of the device again to display the second number.Next Step
. The MFA device is now associated with the AWS account. The next time you use your AWS account credentials to sign in, you must type a code from the hardware MFA device.