AWS root account credentials with no MFA are a single compromised email away from complete account loss. The AWS root account should never be used for day-to-day operations, should have a hardware MFA token attached, and its access keys should be deleted entirely. All IAM users with console access require MFA. Enforce this with an IAM policy that denies all actions unless MFA is present. The Snowflake credential theft campaign in 2024 targeted cloud platform accounts where MFA was not enforced — attackers used credentials obtained from infostealer malware to log in to cloud consoles directly.
Tags