Ensure that every AWS account has a minimum password length policy for AWS IAM User Login Profile

HIGH

Description

Minimum password length policies non-enforcement can increase the likelihood of AWS account to be exploited using Brute force attack, Dictionary or password spray.

Remediation

Password policy for AWS accounts can be created and managed in the AWS IAM Console.

In AWS Console -

  1. Sign in to the AWS Console and go to the IAM console.
  2. Choose Account settings in the navigation pane.
  3. Select 'Change password policy' in the Password policy section.
  4. Select the password policy configuration.
  5. Select Save changes.

In Terraform -

  1. In the aws_iam_user_login_profile resource, set the password_length field to an appropriate value.

References:
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_account-policy.html
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_user_login_profile

Policy Details

Rule Reference ID: AC_AWS_0148
CSP: AWS
Remediation Available: Yes
Resource Type: Policy

Frameworks