turbot/aws_compliance

Query: iam_user_mfa_enabled

Usage

powerpipe query aws_compliance.query.iam_user_mfa_enabled

SQL

select
user_arn as resource,
case
when not mfa_active then 'alarm'
else 'ok'
end as status,
case
when not mfa_active then user_name || ' MFA device not configured.'
else user_name || ' MFA device configured.'
end as reason,
account_id
from
aws_iam_credential_report;

Controls

The query is being used by the following controls: