TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: How do you manage AWS root MFA in a remote work environment?

13 pointsby gfisherover 2 years ago
As offices are going more and more remote, how do you handle your AWS root 2 Factor credentials? We have typically used physical hardware keys that we store in a safe, but with employees leaving the city and the state, we are running low on in-city employees.<p>Is there a smart solution for multi factor authentication that can be shared between people who are remote?

6 comments

GauntletWizardover 2 years ago
No, there&#x27;s no good answer to this. Don&#x27;t ever use the Root account itself. Use a corporate Yubikey, kept in a safe or better yet - Corporate Safety Deposit Box - that only the highest-level technical leads (3-5) have access to and keys to.<p>You should be using IAM user accounts for everything else. Unprivileged base users with access to two different roles. One for general use, one that has administrator access. Build a lambda that sends a daily e-mail summarizing logins to the second and actions those logins took to your security team. You only need to be quite this complex as your corporation grows, and you probably should only ever have a (under twenty) list of people with access to that second role.<p>The other key to this puzzle is separate AWS Root Accounts for different use cases; Run your Dev in one and give out the administrative role willy-nilly, &quot;Prod&quot; in another that&#x27;s tightly locked down. AWS SSO is one good solution to managing all these accounts (there are others). Run your &quot;Prod Data but not visible to customers&quot; in another if you must have it (I suggest investing in automation instead - Set up a service team to handle understanding requests for &quot;Prod&quot; data, that will run queries in prod after vetting them and anonymizing, but don&#x27;t ever load that data into staging; Have them also help engineers sufficiently fake that data).
评论 #32959642 未加载
imduffy15over 2 years ago
Not a solution for shared multi factor auth but maybe some ideas…<p>- the root account should not be used. Disable it from being able to do anything with an SCP<p>- new accounts created with aws organisations by default have a random password and no mfa. Access is granted by going through the password reset process. Switch to this process for existing accounts, randomise all the passwords, grant break glass access via password resetting (ensure your contact details are valid). The password reset typically requires access to the email account (make it accessible via SSO) and potentially a phone call, ensure a virtual phone number is used and root holders can point it at their phone.<p>- use the likes of azure ad, keycloak or okta to store your organisations identities. Require MFA on them via yubikey. Enable access to multiple aws accounts via aws sso.<p>- for ssh access switch to using aws ssm.
trelliscodedover 2 years ago
I try not to handle my root account credentials. Everything on the list that requires root account access is pretty scary:<p><a href="https:&#x2F;&#x2F;docs.aws.amazon.com&#x2F;general&#x2F;latest&#x2F;gr&#x2F;root-vs-iam.html#aws_tasks-that-require-root" rel="nofollow">https:&#x2F;&#x2F;docs.aws.amazon.com&#x2F;general&#x2F;latest&#x2F;gr&#x2F;root-vs-iam.ht...</a><p>At one place, they gave them to outside counsel, and at another place they&#x27;re in a safe that only the trusted company ops person has access to, and she isn&#x27;t remote.<p>Generally, you should be breaking your footprint into different AWS accounts under an org with SCPs if you really need root account access for something, not sharing the credentials for the main account.
评论 #32959658 未加载
abrookewoodover 2 years ago
The root account should not be used to do anything except set up Admin accounts in IAM. That said, to ensure that the credentials aren&#x27;t lost if someone leaves, what we do is save the QR code to an offline secure database (like KeePass) that is backed up regularly (e.g. on Dropbox). That way all the admins can use the same MFA account.
评论 #32959647 未加载
acranoxover 2 years ago
You can use the TOTP 6 digit code method, but instead of just scanning the QR code with your phone, you save the “serial” in your password manager and then all your employees can add that serial to the app on their device. Did that make sense? That’s what I do.
评论 #32959807 未加载
mannyvover 2 years ago
Our CEO has the root creds in his 1password. Everyone who needs it had admin roles with billing.<p>If he gets hit by a bus we know enough to recover everything.