You should check your security configuration in the following situations:
When reviewing your account security configuration, remember to:
You can use the AWS Management Console to download the credential report as a comma-separated values (CSV) file. Please note that it may take up to 4 hours for the credential report to reflect changes. To download the credential report using the AWS Management Console:

You can find more information about the report at https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html
You can use the IAM service in the AWS Management Console to configure and enable a virtual MFA device for the root user. MFA is an intermediary application, usually a personal phone, that authenticates whether the person logging in is the root user. Only the root user can manage the MFA device for themselves. You need to log in with the root user’s credentials, you cannot use another IAM account to change this setting.
If you lose or cannot use the MFA device, you can still log in by verifying your identity via:
So, before enabling MFA, make sure that: The email and phone number in your AWS account are correct and that you have access.
To learn about signing in with alternative authentication factors, see What happens if your MFA device is lost or broken?. To disable this feature, contact AWS Support.
Use your AWS account email address and password to sign in as the root user of your AWS account to the IAM console.
Do one of the following:

MyMFADevice
The options include:
Alternate contacts allow AWS to contact someone else about account-related issues, even when you are not available.


Next, enter contact information for billing, operations, and security.
Finally, select Update.
The access key (including the Access Key ID and Secret Access Key) is used to make requests to AWS programmatically (e.g., using the AWS CLI or SDK). However, never use the root user’s access key, as it has full access rights to all services and resources, including billing information. You cannot limit permissions when using the root user’s access key, so it is very risky in terms of security.
Safe access method:
Do not create access keys for the root user unless absolutely necessary.
Sign in to the AWS Management Console with the root user’s email and password.
Create an IAM user with administrative privileges.
Use that IAM user to create access keys if needed.
Delete the root user’s access key as soon as possible to protect the account.
Rotate (replace) or delete the key in the Security Credentials section of the AWS Management Console.
Note: You need to sign in with your root user credentials (email and password) to do this.
On the right side of the navigation bar, select your account name and select Security Credentials

Delete the root user access key.

Never share your AWS account password or access key with anyone.
Use your AWS account email address and password to sign in to the AWS Management Console as the root user.
If you previously signed in to the console using IAM user credentials, your browser may remember this preference and open a sign-in page specific to your account. You cannot use the IAM user sign-in page to sign in with your AWS account root user credentials. If you see the IAM user sign-in page, click Sign in with root account credentials near the bottom of the page to return to the main sign-in page. From there, you can enter your AWS account email address and password.
In the upper-right corner of the console, select your account name or number, and then select Account.


Choose a strong password. Although you can set an account password policy for IAM users, it does not apply to your AWS account root user. AWS requires that your password meet the following conditions: - Be at least 8 characters and at most 128 characters long. - Include at least three of the following character types: uppercase, lowercase, numbers, and ! @ # $ % ^ & * () <> [] {} | _ + - = symbols. - Not the same as your AWS account name or email address.
To protect your password, it is important to follow these best practices:
Change your password periodically and keep it secret, because anyone who knows your password can access your account.
Use a different password on AWS than you use on other sites.
Avoid using easy-to-guess passwords, like secret, password, amazon or 123456, things like dictionary words, your name, email address or other personal information that can be easily obtained.

