<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Aws on Luiz Felipe F M Costa</title><link>https://thenets.org/tags/aws/</link><description>Recent content in Aws on Luiz Felipe F M Costa</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 02 May 2021 16:15:14 +0000</lastBuildDate><atom:link href="https://thenets.org/tags/aws/index.xml" rel="self" type="application/rss+xml"/><item><title>Enforce MFA for IAM users</title><link>https://thenets.org/posts/enforce-mfa-for-iam-users/</link><pubDate>Sun, 02 May 2021 16:15:14 +0000</pubDate><guid>https://thenets.org/posts/enforce-mfa-for-iam-users/</guid><description>&lt;p&gt;It&amp;rsquo;s not easy to protect AWS accounts and one of the most common issues is related to credentials leakage that gives access even to all company&amp;rsquo;s resources. Multi-Factor Authentication (MFA) is one way to drastically mitigate most of those attacks.&lt;/p&gt;
&lt;h2 id="why-use-mfa"&gt;Why use MFA?&lt;/h2&gt;
&lt;p&gt;Do you need some reference for how important it is? Check it out:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Time and time again we see user passwords treated with minimal to no security. They are kept in plaintext, reused again and again by employees, and left to fend for themselves in the form of single-factor authentication. This practice has resulted in billions of dollars stolen and enormous data breaches from which it takes organizations months, sometimes years, to recover. Or even worse, threat actors sell your legitimate credentials over and over, meaning your organization never has time to recover and is constantly on the defense. Sound familiar? If we know the problem, we can begin to work toward the solution.\&lt;/p&gt;</description></item></channel></rss>