A few days ago, I noticed something strange with my phone. The screen had started behaving unpredictably. Sometimes it responded perfectly, and sometimes it ignored my touch completely.At first it just felt like a minor inconvenience. But then a thought crossed my mind that made me pause.My authenticator app was on that phone and that authenticator app was the only way I could generate the login codes for my Amazon Web Services account.
Suddenly the situation felt much more serious. If the phone stopped working completely, I could lose access to my AWS account. That realization pushed me to take a closer look at how my account was secured. What started as a small precaution turned into a surprisingly valuable learning experience about MFA backups, IAM users, and AWS security best practices.
When I first created my AWS account, I had already enabled Multi-Factor Authentication on the root user. At the time, I thought that was enough. AWS strongly recommends MFA, and I had followed that advice. But the phone issue made me realize something I hadn’t considered before. Security isn’t just about enabling MFA!
It’s also about making sure you can still access your account if something happens to the device generating the authentication codes.
Phones get lost. Screens break. Devices fail. If my phone stopped working entirely, the authentication codes stored in that authenticator app would disappear with it. Recovering access to an AWS account in that situation can be difficult and stressful. That was the moment I decided I needed a backup MFA device. Fortunately, AWS allows multiple MFA devices to be registered for an account. I installed an authenticator extension on my laptop and connected it as a second MFA device. Now my authentication setup includes two devices generating login codes: my phone and my laptop.

While going through this process, I also revisited another important AWS best practice: avoiding daily use of the root account. When you create an AWS account, the first identity you receive is the root user. The root account has unrestricted access to every service and resource in the account. Because of that level of power, AWS recommends using the root account only for critical account management tasks. Daily work should be done using users created through AWS Identity and Access Management. Following that recommendation, I created an IAM administrator user with full administrative permissions and enabled MFA for that user as well.
Of course, the process wasn’t completely smooth. At one point, AWS told me that my MFA token was out of sync. After a bit of investigation, I discovered the problem was simply that my laptop clock was slightly out of alignment with internet time servers. Once the system clock synchronized correctly, the authentication codes started working again.
Another moment of confusion happened when I accidentally used the wrong MFA code during login. Because I now had two AWS tokens in my authenticator, it was easy to mix them up. One token was for the root account and the other for the IAM administrator user. Using the wrong one resulted in login failures that initially made me think something was broken. After completing everything, my account now follows a much safer structure.
Looking back, the entire process started with something as simple as a phone screen glitch. But that small problem forced me to rethink my AWS security setup and implement practices that I probably should have put in place much earlier.
For anyone learning AWS, security fundamentals can sometimes feel less exciting than launching EC2 instances or deploying applications. But they are just as important. Enabling MFA, creating backup authentication devices, and using IAM users instead of the root account are small steps that can prevent major headaches later. In my case, a malfunctioning phone screen turned into a reminder that good cloud security starts with the basics.



Top comments (0)