Skip to main content

๐Ÿ›ก๏ธ AWS Account does not have an IAM Password Policy๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Account does not have an IAM Password Policy๐ŸŸข
  • ID: /ce/ca/aws/iam/password-policy
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Similar Policiesโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

This policy identifies AWS Accounts that do not have an IAM password policy configured.

A strong password policy helps enforce requirements such as minimum password length, expiration period, and complexity rules for IAM users.

Rationaleโ€‹

IAM password policies enable administrators to enforce password strength and complexity for users signing in to the AWS Management Console. Without a password policy, users may create weak passwords that are easily guessed or compromised, increasing the risk of unauthorized access to your AWS environment.

Auditโ€‹

This policy flags an AWS Account as INCOMPLIANT if there is no related AWS IAM Password Policy.

Referencesโ€‹

  1. CCE-78907-3
  2. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_account-policy.html
  3. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#configure-strong-password-policy

Remediationโ€‹

Open File

Remediationโ€‹

Configure an IAM Password Policyโ€‹

Set a strong password policy to enforce minimum length, complexity, expiration, and password reuse restrictions for IAM users.

From Consoleโ€‹
  1. Sign in to the AWS Management Console with permissions to manage IAM account settings.

  2. Navigate to the IAM service.

  3. In the left navigation pane, select Account Settings.

  4. In the Password policy section, choose Change password policy and configure the following (as an example):

    • Enforce minimum password length: Set to 14 characters.
    • Require at least one uppercase letter (A-Z).
    • Require at least one lowercase letter (a-z).
    • Require at least one number.
    • Require at least one non-alphanumeric character (e.g., ! @ # $ % ^ & *).
    • Enable password expiration: Set Expire passwords in โ‰ค 90 days.
    • Prevent password reuse: Remember 24 previous passwords.
  5. Click Save changes to apply the policy.

From Command Lineโ€‹

Run the following AWS CLI command to configure the password policy:

... see more

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ AWS Foundational Security Best Practices v1.0.0 โ†’ ๐Ÿ’ผ [IAM.7] Password policies for IAM users should have strong configurations13no data
๐Ÿ’ผ AWS Well-Architected โ†’ ๐Ÿ’ผ SEC02-BP01 Use strong sign-in mechanisms5no data
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ Credential Lifecycle Management24no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ AC-2(1) Automated System Account Management (M)(H)26no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ AC-2(3) Disable Accounts (M)(H)6no data
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ IA-5(1) Password-based Authentication (L)(M)(H)113no data
๐Ÿ’ผ FedRAMP Low Security Controls โ†’ ๐Ÿ’ผ IA-5(1) Password-based Authentication (L)(M)(H)13no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ AC-2(1) Automated System Account Management (M)(H)26no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ AC-2(3) Disable Accounts (M)(H)6no data
๐Ÿ’ผ FedRAMP Moderate Security Controls โ†’ ๐Ÿ’ผ IA-5(1) Password-based Authentication (L)(M)(H)13no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ AC-2(1) Account Management _ Automated System Account Management426no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ AC-2(3) Account Management _ Disable Accounts16no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control21no data
๐Ÿ’ผ NIST SP 800-53 Revision 5 โ†’ ๐Ÿ’ผ IA-5(1) Authenticator Management _ Password-based Authentication13no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 8.2.3 Passwords/passphrases must have complexity and strength.13no data
๐Ÿ’ผ PCI DSS v3.2.1 โ†’ ๐Ÿ’ผ 8.2.5 Do not allow an individual to submit a new password/passphrase that is the same as any of the last four passwords/passphrases he or she has used.13no data
๐Ÿ’ผ PCI DSS v4.0.1 โ†’ ๐Ÿ’ผ 8.3.6 If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1, they meet the minimum level of complexity.3no data
๐Ÿ’ผ PCI DSS v4.0.1 โ†’ ๐Ÿ’ผ 8.3.7 Individuals are not allowed to submit a new password/passphrase that is the same as any of the last four passwords/passphrases used.3no data
๐Ÿ’ผ PCI DSS v4.0 โ†’ ๐Ÿ’ผ 8.3.6 If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1, they meet the minimum level of complexity.13no data
๐Ÿ’ผ PCI DSS v4.0 โ†’ ๐Ÿ’ผ 8.3.7 Individuals are not allowed to submit a new password/passphrase that is the same as any of the last four passwords/passphrases used.3no data