π‘οΈ AWS Cognito User Pool Password Policy is not strongπ’
- Contextual name: π‘οΈ User Pool Password Policy is not strongπ’
- ID:
/ce/ca/aws/cognito/user-pool-strong-password-policy - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [Cognito.3] Password policies for Cognito user pools should have strong configurations
Descriptionβ
Descriptionβ
This policy identifies Amazon Cognito user pools with password policies that do not meet a strong password baseline.
Rationaleβ
Amazon Cognito user pools often store local application identities and issue authentication tokens to connected applications. Weak password requirements make brute-force attempts, credential stuffing, and password reuse attacks more likely to succeed.
Requiring a minimum password length, mixed character types, and a short temporary password validity period helps reduce the risk of unauthorized access and improves the security posture of user pools that support username-password authentication.
Auditβ
This policy flags a Cognito User Pool as
INCOMPLIANTwhen any of the following is true:
Password Policy Minimum Lengthis less than 8Password Policy Is Require Lowercaseis not truePassword Policy Is Require Uppercaseis not truePassword Policy Is Require Numbersis not truePassword Policy Is Require Symbolsis not truePassword Policy Temporary Validity Daysis greater than 7
Remediationβ
Remediationβ
Strengthen the User Pool Password Policyβ
Update the Cognito user pool password policy to require a minimum length of at least 8 characters, uppercase and lowercase letters, numbers, symbols, and a temporary password validity period of 7 days or fewer.
From Command Lineβ
aws cognito-idp update-user-pool \
--region {{region}} \
--user-pool-id {{user-pool-id}} \
--policies '{
"PasswordPolicy": {
"MinimumLength": 8,
"RequireUppercase": true,
"RequireLowercase": true,
"RequireNumbers": true,
"RequireSymbols": true,
"TemporaryPasswordValidityDays": 7
}
}'If you intentionally rely on alternative authentication patterns, verify that the user pool configuration and application design are formally approved before accepting weaker password settings.
policy.yamlβ
Linked Framework Sectionsβ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [Cognito.3] Password policies for Cognito user pools should have strong configurations | 1 | no data | |||
| πΌ Cloudaware Framework β πΌ Credential Lifecycle Management | 29 | no data |