Skip to main content

πŸ›‘οΈ AWS Cognito User Pool Password Policy is not strong🟒

  • Contextual name: πŸ›‘οΈ User Pool Password Policy is not strong🟒
  • ID: /ce/ca/aws/cognito/user-pool-strong-password-policy
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logic​

Similar Policies​

Description​

Open File

Description​

This policy identifies Amazon Cognito user pools with password policies that do not meet a strong password baseline.

Rationale​

Amazon Cognito user pools often store local application identities and issue authentication tokens to connected applications. Weak password requirements make brute-force attempts, credential stuffing, and password reuse attacks more likely to succeed.

Requiring a minimum password length, mixed character types, and a short temporary password validity period helps reduce the risk of unauthorized access and improves the security posture of user pools that support username-password authentication.

Audit​

This policy flags a Cognito User Pool as INCOMPLIANT when any of the following is true:

  • Password Policy Minimum Length is less than 8
  • Password Policy Is Require Lowercase is not true
  • Password Policy Is Require Uppercase is not true
  • Password Policy Is Require Numbers is not true
  • Password Policy Is Require Symbols is not true
  • Password Policy Temporary Validity Days is greater than 7

Remediation​

Open File

Remediation​

Strengthen the User Pool Password Policy​

Update the Cognito user pool password policy to require a minimum length of at least 8 characters, uppercase and lowercase letters, numbers, symbols, and a temporary password validity period of 7 days or fewer.

From Command Line​
aws cognito-idp update-user-pool \
--region {{region}} \
--user-pool-id {{user-pool-id}} \
--policies '{
"PasswordPolicy": {
"MinimumLength": 8,
"RequireUppercase": true,
"RequireLowercase": true,
"RequireNumbers": true,
"RequireSymbols": true,
"TemporaryPasswordValidityDays": 7
}
}'

If you intentionally rely on alternative authentication patterns, verify that the user pool configuration and application design are formally approved before accepting weaker password settings.

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Cognito.3] Password policies for Cognito user pools should have strong configurations1no data
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό Credential Lifecycle Management29no data