ASSOCIATED DRATA CONTROL
This test is part of the MFA on Accounts control that ensures Multi-Factor Authentication (MFA) is being required for access to any sensitive systems or applications. Drata will verify that in order to log in to your company Infrastructure Management Console a user needs to provide their ID, a password, and then either a One-Time Password (OTP) or certificate.
WHAT TO DO IF A TEST FAILS
If Drata finds that there are infrastructure accounts that do not have MFA enabled the test will fail. With a failed test you will receive a list of users that do not have MFA enabled on their account.
STEPS FOR PASSING
To ensure a validated state when testing for MFA on the Infrastructure Console, please follow the steps listed in the table below. In certain cases, the individual failing users will need to modify their account MFA implementation. Once the provider steps have been completed, the next nightly user sync will pick up the changes and rerun the test to show the latest results.
Provider / Technology | Provider Steps |
Atlas MongoDB |
|
AWS - IAM |
Then, as the new IAM user:
|
Azure - Users |
Then, as the new user:
This may take a few hours to propagate within Azure.
Note: Drata also supports pulling MFA when Conditional Access Policies or Security Defaults are in place. This does require that Microsoft 365 be used as your IdP connection. Please reach out to our Technical Support team if you need more guidance. |
Cloudflare - Users |
Note: You will need to make sure that an Admin has connected both the IDP and Cloudflare to Drata. |
GCP - IAM | Accounts within GCP must also be added to Google Workspace (GW, fka GSuite).
To Add a User to GW and GCP
|
Heroku |
NOTE: ensure the user making the Heroku connection is part of an Enterprise Team, and that global permissions have been granted to the Drata OAuth application. This will allow Drata to pull MFA for both enterprise and standard team members. |
HELPFUL RESOURCES