This rule ensures IAM password policy requires a minimum length of 14 or higher.
Rule | Ensure IAM password policy requires a minimum length of 14 or greater |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Critical |
IAM Password Policy: Minimum Length Requirement
Description
The IAM Password Policy in AWS allows you to enforce specific rules and constraints for user passwords. In order to comply with the NIST 800-53 Revision 5 requirements, you must configure the policy to enforce a minimum length of 14 or greater for user passwords.
Troubleshooting
In case users are unable to set longer passwords or are encountering issues related to the minimum length requirement, follow the steps below to troubleshoot the problem.
1. Verify the IAM Password Policy
2. Check User Passwords
3. Verify IAM User Configuration
4. Reset Passwords (if necessary)
Policy Configuration
To enforce a minimum password length of 14 or greater for IAM users in AWS, you need to configure the IAM Password Policy using AWS CLI. Follow the steps below:
1. Install and Configure AWS CLI
aws configure
command and providing your AWS access key, secret access key, region, and output format.2. Create a JSON Policy File
{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "iam:UpdateAccountPasswordPolicy",
"Resource": "*",
"Condition": {
"NumericGreaterThan": {
"aws:RequestedMinimumPasswordLength": "13"
}
}
}
}
3. Save and Name the File
iam-password-policy.json
.4. Apply the Policy using AWS CLI
aws iam update-account-password-policy --cli-input-json file://iam-password-policy.json
5. Verify the Updated Policy
aws iam get-account-password-policy
Conclusion
By following the steps above, you can configure the IAM Password Policy in AWS to comply with the NIST 800-53 Revision 5 requirement for a minimum password length of 14 or greater. Remember to educate users about the policy and troubleshoot any issues they may encounter during the process.