On-Prem

Amazon adds MFA to its enterprise email service ... eight years after launch

No rush, guys


Amazon's cloud-hosted email service for enterprises now offers multifactor authentication, which is great, except that the service launched nearly a decade ago. 

Amazon announced yesterday that MFA is now available for WorkMail, its challenge to Microsoft Exchange, and that administrators who manage instances of it can now connect the mail and calendar service to AWS' identity and access management service - Identity Center. 

In other words, MFA won't be automatically enabled for Amazon's enterprise email service, so administrators running WorkMail will still need to configure it, and add each WorkMail user to the IAM Identity Center, manually based on AWS' documentation

The fact that a security service as simple as MFA was missing from something that so desperately needs it - an enterprise email platform run by one of the biggest (if not the biggest) cloud services providers in the world - is shocking, frankly. WorkMail users appear to know that too, as suggested by multiple questions asked on re:Post, AWS' customer Q&A site, in recent years.

"Two-factor authentication is an absolute must, especially for email accounts," one user commented on a three-year-old post. AWS responses on multiple posts have indicated MFA for WorkMail "is treated as a feature request" that's been in development for at least as long as that post. 

Of course, it's not like there wasn't any sort of identity verification available for WorkMail - AWS added support for SAML 2.0 to WorkSpaces, its virtual desktop environment, in late 2022, so larger enterprises making use of that service could go through the leg work to add some form of identity management to WorkMail. 

But as one Reddit user pointed out, SAML still isn't MFA. "I still don't like it. It's really, really hard to beat the slick offerings by both Google and MS [Microsoft], even if they are a cup of coffee a month more per user," Redditor Zenin said about WorkMail's lack of MFA. 

AWS told The Register that, technically speaking, customers could have added MFA to WorkMail via another method prior to yesterday's announcement, but that wasn't a simple process, either.

"It was previously possible to configure MFA via AWS Directory Service, but setup was complex for customers and it only supported AWS-managed Microsoft ADs," an AWS spokesperson told us in an email statement. "WorkMail continues to adhere to general security updates consistent with AWS standards, such as moving TLS minimum versions to 1.2, expanding audit logging support, and providing guidance to customers [on] how to implement overarching protections against a wide range of potential compromises." 

Eight years? Really?!

Amazon launched WorkMail in 2016 after a year of early access, ostensibly to steal customers from Microsoft who were still using Exchange mail, in many cases despite migrations to AWS for other cloud services. From its inception, WorkMail accounts could be added to native email applications like Outlook, Apple Mail, or iOS/Android mail apps, and a web portal exists as well. 

WorkMail hasn't garnered much attention over the years, with Microsoft dominating the market share for cloud-hosted email and calendar services in recent years. Last year, Microsoft changed its policies to allow Office products to run in AWS virtual desktops delivered via WorkSpaces, likely delivering a further blow to the market for WorkMail. 

Amazon's own record on WorkMail hasn't exactly been a vote of confidence, either. In October 2023, the cloud colossus signed a $1 billion deal with Redmond to bring Microsoft 365 productivity apps (like, ahem, Outlook) to its systems for corporate and frontline workers. It's hardly a great look when your employees would rather use a competitor's product than one developed in-house. 

Maybe that's why it took eight years to get MFA formally added to WorkMail? Regardless, with that level of priority (i.e., a lack of one) on developing essential end-user security features, enterprise customers might want to look elsewhere. ®

Send us news
Post a comment

AWS Cloud Development Kit flaw exposed accounts to full takeover

Remember Bucket Monopoly? Yeah, it gets worse

Amazon to cough $75B on capex in 2024, more next year

Despite extending server lifespans, AI's power demands drive more datacenter builds

Amazon makes $500M bet on itty-bitty nuclear reactors to fuel cloud empire

The duo eyes a target of 5 GW online in US by 2039, assuming tech comes to fruition

AWS boss: Don't want to come back to the office? Go work somewhere else

It's our way or the highway

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing

Developer pockets $2M in savings from going cloud-free

37signals CTO claims cost of new hardware was 'entirely recouped' as contracts expired after AWS exit

Here's a NIS2 compliance checklist since no one cares about deadlines anymore

Only two EU members have completed the transposition into domestic law

Russian spies use remote desktop protocol files in unusual mass phishing drive

The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel

Penn State pays DoJ $1.25M to settle cybersecurity compliance case

Fight On, State? Not this time

Cloud repatriation officially a trend... for specific workloads

It's not a mass exodus, say analysts, but biz bods are bringing things down to earth

Delta officially launches lawyers at $500M CrowdStrike problem

Legal action comes months after alleging negligence by Falcon vendor

ESET denies it was compromised as Israeli orgs targeted with 'ESET-branded' wipers

Says 'limited' incident isolated to 'partner company'