Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Ensure IAM Password Policy Minimum Length Rule

This rule ensures IAM password policy requires a minimum length of 14 or greater.

RuleEnsure IAM password policy requires a minimum length of 14 or greater
FrameworkFedRAMP Low Revision 4
Severity
Critical

IAM Password Policy for FedRAMP Low Revision 4 Compliance

Introduction

The Federal Risk and Authorization Management Program (FedRAMP) sets standard security requirements for cloud products and services used by federal agencies. As part of maintaining compliance with FedRAMP Low Revision 4, it is crucial to implement a robust Identity and Access Management (IAM) password policy, particularly one that enforces a minimum password length of 14 characters or greater.

Password Policy Requirements

Under FedRAMP guidelines, a secure password policy should include the following:

  • Minimum password length of 14 characters
  • A combination of uppercase letters, lowercase letters, numbers, and special characters
  • Password expiration period
  • Password reuse restrictions
  • Password attempt lockout mechanism

Step by Step Guide for Remediation

Step 1: Set IAM Password Policy

To set the IAM password policy via the AWS Management Console:

  1. 1.
    Sign in to the AWS Management Console.
  2. 2.
    Navigate to the IAM Dashboard.
  3. 3.
    In the navigation pane, choose "Account settings."
  4. 4.
    Scroll to the "Password policy" section.
  5. 5.
    Set the minimum password length to 14 characters.
  6. 6.
    Enable other relevant password requirements such as password complexity and rotation policies.
  7. 7.
    Click "Apply password policy."

Step 2: Verify IAM Password Policy via AWS CLI

To verify that the password policy has been correctly set, you can use the AWS Command Line Interface (CLI). First ensure you have the AWS CLI installed and configured with the necessary permissions.

Run the following command to retrieve the current IAM password policy:

aws iam get-account-password-policy

Step 3: Update IAM Password Policy via AWS CLI

If you need to update the IAM password policy via the AWS CLI:

aws iam update-account-password-policy \
  --minimum-password-length 14 \
  --require-symbols \
  --require-numbers \
  --require-uppercase-characters \
  --require-lowercase-characters \
  --allow-users-to-change-password \
  --max-password-age 90 \
  --password-reuse-prevention 24 \
  --hard-expiry

Step 4: Remediate Non-Compliant Passwords

Identify any IAM users with passwords that do not meet the policy, and require a password reset. Notify users that a password update will be required.

Step 5: Monitor and Enforce Compliance

Continuously monitor IAM accounts to ensure all users maintain compliance with the password policy. Utilize AWS Config rules or third-party tools to aid in compliance monitoring.

Troubleshooting Steps

Should you encounter issues with implementing or enforcing the IAM password policy:

  1. 1.
    Verify you have the necessary permissions to manage IAM policies.
  2. 2.
    Ensure there are no conflicting policies that might override your changes.
  3. 3.
    If using the CLI, confirm that your AWS CLI is up to date and configured with the correct region and credentials.
  4. 4.
    Check the AWS CloudTrail logs for any errors or failed attempts to modify the password policy.
  5. 5.
    For any persistent issues, consult the AWS IAM documentation or contact AWS Support.

It is critical to incorporate these requirements into your organization's security protocols to not only ensure FedRAMP Low Revision 4 compliance but also improve overall cybersecurity posture. Regular audits and reviews of IAM policies should be scheduled to maintain compliance over time.

Is your System Free of Underlying Vulnerabilities?
Find Out Now