This rule focuses on preventing password reuse within IAM password policy.
Rule | Ensure IAM password policy prevents password reuse |
Framework | cis_v140 |
Severity | ✔ Medium |
Ensuring IAM Password Policy Prevents Password Reuse for CIS v1.4.0
Introduction to the Rule
The Center for Internet Security (CIS) provides benchmarks that are recognized best practices for securing IT systems and data against threats. CIS v1.4.0 refers to the latest AWS Foundations Benchmark, which includes a recommendation to prevent password reuse in IAM (Identity and Access Management) policy settings. This mitigates the risks associated with using previously compromised credentials.
Detailed Rule Description
The password policy should be configured in such a way that it prevents users from reusing a specified number of their previous passwords. This is to ensure that if a password is compromised, it cannot be reused by the user, further reinforcing the security.
Troubleshooting Steps
If the IAM password policy does not prevent password reuse as outlined by CIS benchmarks:
PasswordReusePrevention
parameter.PasswordReusePrevention
is either not set or set to a value that is too low, adjust it accordingly.Necessary CLI Commands
Use the
aws iam get-account-password-policy
command to retrieve the current password policy:aws iam get-account-password-policy
If the
PasswordReusePrevention
parameter isn’t in compliance:Use the
aws iam update-account-password-policy
command to update the policy and set the password reuse prevention parameter:aws iam update-account-password-policy --password-reuse-prevention <value>
Replace
<value>
with the number of previous passwords that you want to prevent users from reusing.Step-by-Step Guide for Remediation
Check Current Password Policy
First, review the current IAM password policy to determine if it meets the CIS benchmark standards.
Update Password Policy
If the current policy does not prevent password reuse or the value set is not as per CIS recommendations:
CLI Command for Remediation
Alternatively, adjust the password policy using AWS CLI:
aws iam update-account-password-policy --password-reuse-prevention 24
aws iam get-account-password-policy
Remediation Verification
Go back to the IAM dashboard in the AWS Management Console, and verify that the password policy now reflects the changes you've made to comply with the CIS v1.4.0 benchmark for preventing password reuse.
Maintaining strict password policies including preventing password reuse is a fundamental security best practice for AWS environments. Following the steps outlined in this guide will ensure your IAM password policy complies with CIS benchmarks and bolsters your overall AWS security posture.