Check provider logo

AWS Directory Service directory has RADIUS-based MFA enabled

directoryservice_supported_mfa_radius_enabled

Severitymedium
by Prowler

AWS Directory Service directories are evaluated for RADIUS-backed multi-factor authentication, confirming that MFA is configured and the RADIUS integration is active.

Risk

Without RADIUS MFA, directory-based sign-ins to AWS-integrated services rely on a single factor, enabling credential stuffing and phishing to succeed. Compromised passwords can grant unauthorized access, drive data exfiltration, and enable privilege escalation, undermining confidentiality and integrity.

Run this check with Prowler CLI

prowler aws --checks directoryservice_supported_mfa_radius_enabled

Recommendation

Enable and enforce RADIUS-based MFA for all Directory Service authentications. Apply least privilege, harden and monitor the RADIUS infrastructure, rotate shared secrets, and restrict network access (e.g., UDP/1812). Use defense in depth with segmentation and session controls to limit lateral movement and reduce blast radius.

Remediation

CLI

aws ds enable-radius --directory-id <example_resource_id> --radius-settings '{"RadiusServers":["<RADIUS_IP_OR_DNS>"],"SharedSecret":"<SHARED_SECRET>"}'

Terraform
Other
  1. Sign in to the AWS Console and open Directory Service
  2. Select your directory and open it
  3. Go to the Networking & security tab
  4. In Multi-factor authentication, click Actions > Enable
  5. Enter RADIUS server IP(s) and the Shared secret, then click Enable
  6. Wait until the RADIUS status shows Completed

Source Code

Resource Type

Other

References