Skip to main content

💼 [IAM.7] Password policies for IAM users should have strong configurations

  • Contextual name: 💼 [IAM.7] Password policies for IAM users should have strong configurations
  • ID: /frameworks/aws-fsbp-v1.0.0/iam/07
  • Located in: 💼 Identity and Access Management (IAM)

Description

Empty...

Similar

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST SP 800-53 Revision 5 → 💼 AC-2(1) Account Management _ Automated System Account Management416
💼 NIST SP 800-53 Revision 5 → 💼 AC-2(3) Account Management _ Disable Accounts14
💼 NIST SP 800-53 Revision 5 → 💼 AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control11
💼 NIST SP 800-53 Revision 5 → 💼 IA-5(1) Authenticator Management _ Password-based Authentication8
💼 PCI DSS v4.0.1 → 💼 8.3.6 If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1, they meet the minimum level of complexity.2
💼 PCI DSS v4.0.1 → 💼 8.3.7 Individuals are not allowed to submit a new password/passphrase that is the same as any of the last four passwords/passphrases used.2

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (2)

PolicyLogic CountFlags
📝 AWS Account IAM Password Policy minimum password length is 14 characters or less 🟢1🟢 x6
📝 AWS Account IAM Password Policy Number of passwords to remember is not set to 24 🟢1🟢 x6

Internal Rules

RulePoliciesFlags
✉️ dec-x-f7c2faac1