AWS IAM - Not Seeing Data in the MFA Configuration Monitor

If this monitor returns no data, it's often due to the absence of users with password-based access. This monitor filters out service accounts and only includes users where password_enabled = true.

🔍 Why This Happens

The monitor Cloud IAM | Users Configuration of MFA only returns data for IAM users who have:

  • Console access

  • A password set

If no such users exist, the monitor will return no results.
Service accounts and programmatic-only users are excluded.

 

What You Need to Do

To begin seeing data, ensure you have at least one IAM user with console access and a password. You can either:

➕ Option 1: Create a New IAM User with a Password

  1. Open the IAM Console

  2. Click “Add user”

  3. Enter a username

  4. Under Access type, select “AWS Management Console access”

  5. Choose an autogenerated or custom password

  6. Set appropriate permissions or assign the user to a group

  7. Review the settings and create the user

  8. Share credentials so the user can log in

🔧 Option 2: Enable Password for an Existing IAM User

  1. Open the IAM Console

  2. Go to Users and select the existing user

  3. Click the “Security credentials” tab

  4. In the Console password section, click “Manage”

  5. Assign a custom password and optionally require a reset

  6. Save changes

📌 Reminder: Once you’ve added a password-enabled user, the monitor will begin returning data automatically.