Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

AWS Logo
Menu

The evolution and future of AWS root access management and MFA integration

AWS security evolution: from root access to MFA integration. Tracks progression of cloud security mechanisms, providing historical context and future outlook.

Harish Mandhadi
Amazon Employee
Published Feb 11, 2025
In the ever-evolving landscape of cloud computing, security remains paramount. At AWS, we've witnessed firsthand the transformation of security practices, particularly in the realm of root access management and multi-factor authentication (MFA). This journey, from the early days of AWS to our vision for the future, reflects our unwavering commitment to providing customers with robust, scalable, and user-friendly security solutions.
As we delve into the evolution of AWS root access management, we'll explore how centralized root access has become a cornerstone of modern cloud security. We'll examine the impact of MFA integration on overall security posture and discuss the MFA adoption timelines that have shaped—and continue to shape—our approach to enhanced security design.

Evolution of AWS Account Security

What is AWS Root User?

The AWS Account Root User is the initial identity created when establishing an AWS account, identified by the email address and password used during account creation. This identity has complete, unrestricted access to all AWS services and resources within the account, including billing information and account settings.
This powerful identity goes by several names in the AWS world:
* AWS Account Root User
* Account Owner
* Account Root User
* Root User/Account
Root user
Root user
As our customers infrastructure complexity grew, we grew along with them. In 2011, we introduced IAM service and now customers can create multiple roles, users and assign polices that could be scoped down using fine grained permissions. This allows customers to scale their infrastructure while maintaining a high security bar for their cloud infrastructure.
Our customer's AWS journey began modestly with a single workload leveraging a few services, which were secured by a simple username and password. As their ambitions grew, so did their infrastructure, leading to the adoption of multiple accounts for enhanced security through account isolation. By 2017, AWS introduced Organizations and Control Tower, enabling centralized management and secure-by-default landing zones for customers needing to manage hundreds or thousands of accounts.
Fast forward to 2025, the security landscape has dramatically evolved. Root users, holding the highest privileges in each AWS account, now require more than just a username and password. Multi-Factor Authentication (MFA) has become a mandatory safeguard, with every account in an organization necessitating its own unique MFA device.
customer journey
customer journey
As AWS evolved, the root user's role was significantly refined. The 2011 introduction of IAM enabled customers to implement scoped-down policies and fine-grained access control, restricting root user actions to a handful of critical operations. But we still have the root user, what is it used for? There are few actions only root user can perform and after talking to customers, we identified a small set of actions that only the root user can perform. When categorized by frequency of use, these actions fall along a spectrum, ranging from rare to occasional. For example, we use this infrequent actions like closing an account, register as a marketplace seller etc and actions that fall in the middle like changing the account settings and access to billing. But what we found out was there are couple of actions that customers took which include recovering Amazon S3 bucket policies or SQS queue policies, particularly crucial when implementing least privilege practices where accidental lockouts can occur.
Recognizing this pain point, if we can make this easier for our customers with allows them to do these actions with less friction. AWS has now unveiled Central Management for Root User Access which can centrally manage root credentials and perform tasks that previously required root credentials across member accounts in your organization.
root user frequent actions
root user frequent actions

Central Root Access Management

This is the new mechanism that customers can use with AWS Organizations and Control Tower, allows you to manage, secure, and control highly privileged access across member accounts within your AWS organization. The feature offers two key components:
1. Root credential management
2. Privileged root actions in member accounts
As with all AWS services, we've incorporated layer of audit and visibility. This allows you to easily monitor your entire infrastructure, providing a clear overview of your accounts status and configuration.
1. Root credential management
Centralized control over root user credentials for member AWS accounts. By enabling this feature, you can disable root user credentials for selected member accounts, effectively eliminating the possibility of root user login which means root user is unavailable and reducing your security surface area.
* Remove long-term root credentials – Security teams can now programmatically remove root user credentials from member accounts, confirming that no long-term privileged credentials are left vulnerable to misuse.
* Prevent credential recovery – It not only removes the credentials but also prevents their recovery, safeguarding against any unintended or unauthorized root access in the future.
* Provision secure-by-default accounts – Because you can now create member accounts without root credentials from the start, you no longer need to apply additional security measures like MFA after account provisioning. Accounts are secure by default, which drastically reduces security risks associated with long-term root access and helps simplify the entire provisioning process.
* Help to stay compliant – Root credentials management allows security teams to demonstrate compliance by centrally discovering and monitoring the status of root credentials across all member accounts. This automated visibility confirms that no long-term root credentials exist, making it easier to meet security policies and regulatory requirements.
central root user
central root user
2. Privileged root actions in member accounts
* Privileged root actions now allow central execution of high-privilege actions across your organization's member accounts. Security teams can assist member account users by performing critical operations - like unlocking misconfigured S3 buckets or SQS queues policies..
* For member account credential management, if root credentials are already in place, they can be deleted. However, if root credentials don't exist, the admin must enable the password recovery mechanism for the member account. It's crucial to note that without enabling this feature, the member account cannot reset its password. This underscores the importance of explicitly allowing password recovery to ensure member accounts can regain access when needed.
* **Root Sessions** are temporary, task-scoped credentials as a secure alternative to maintaining long-term root access in AWS member accounts. Through centralized management, security teams can perform specific privileged actions like unlocking S3 bucket policies or managing SQS queue policies without needing permanent root credentials for each account. Think of root sessions as the "how" and privileged root actions as the "what". Root Sessions enable you to perform Privileged Root Actions.
privileged actions
privileged actions

Considerations and things you should know:

* This feature is reversible, allowing you to disable or re-enable it as needed.
* It's recommended to use a delegated admin account rather than logging into the AWS Organizations management account regularly.
* Privileged actions can be performed in member accounts through the delegated admin account, eliminating the need for root access.
* You can delete root user credentials for member accounts, effectively disabling root access until re-enabled through this feature.
* After enabling Root Access Management in the IAM console, you'll see an overview of your AWS organization by organizational units. This organization view shows which accounts have root user credentials enabled.
* Enabling this feature will not disrupt any existing behavior, but review and update any playbooks using root credentials before deleting/disabling.

Revolutionizing AWS Account Security: From Chaos to Control

Current state:
* Today's AWS member account landscape presents a familiar challenge to many organizations. Your accounts likely exist in one of two states: either with active root user credentials that need constant monitoring, MFA associated to protect or with randomly generated passwords that were discarded/stored in the name of security. This leads to a dependency on root user account recovery mechanisms whenever access is needed - a practice that's both inefficient and potentially risky.
Ideal state:
* Enable root access management feature - a secure-by-default state where member accounts operate without root user credentials. The transition is simple - just log into your delegated admin account, locate the member account, and click to delete credentials. Need temporary root access? You can enable password recovery when needed, complete your tasks, and return to the secure state.
* Best of all, once you enabled this centralized root access feature new member accounts automatically start with this default enhanced security posture, ensuring your AWS organization maintains a robust security stance from day one.
* The standard for AWS organizational security is elegantly simple: maintain just one root user - the management account's root user - secured with Multi-Factor Authentication (MFA). Member accounts should operate without root users entirely, creating a cleaner, more secure, and more manageable AWS environment.

How this root access management feature impacts MFA on Root Trusted Advisor check

Enabling root access management affects the Trusted Advisor MFA check behavior in a nuanced way.
* For new member accounts created via AWS Organizations after enabling the root user access feature and disabling root credentials, Trusted Advisor's MFA check accurately refrains from flagging any findings. This behavior aligns with the account's security posture, as there's no root user present to secure with MFA.
* However, for existing member accounts where root credentials were initially present but later disabled or deleted using the "Root access management-take privileged actions" feature, Trusted Advisor continues to flag the absence of MFA on the root account. This creates a discrepancy where accounts with no active root credentials are still flagged for lacking MFA protection. 
* *Coming soon* - Trusted advisor team is working to align the TA check's behavior with the actual security posture of the account. But it is not implemented yet. Security Hub integration is also in progress, with efforts focused on aligning and incorporating the updated functionality.

MFA requirement adoption timelines

AWS prioritizes security by design, implementing features that enhance our customers' default security posture. Multi-factor authentication (MFA) is a cornerstone of account security, preventing over 99% of password-related attacks.
We first announced changes to MFA requirement are coming in stages
* In May 2024, we began requiring MFA for AWS Organizations management account root users, starting with users in larger environments.
* In June 2024, we launched support for FIDO2 passkeys as an MFA method, to offer customers an additional highly secure but also user-friendly way to align with their security requirements.
* Beginning in the Spring of 2025, customers who have not enabled central management of root access will be required to register MFA for their AWS Organizations member account root users in order to access the AWS Management Console.
You can learn more about our new feature to centrally manage root access in the IAM User Guide, and more about using MFA at AWS in the AWS MFA in IAM User Guide.
 

Any opinions in this post are those of the individual author and may not reflect the opinions of AWS.

Comments