This rule focuses on strong configurations for IAM users' password policies.
Rule | Password policies for IAM users should have strong configurations |
Framework | PCI v3.2.1 |
Severity | ✔ Medium |
Password Policies for IAM Users - PCI v3 Compliance
The Payment Card Industry Data Security Standard (PCI DSS) version 3 (PCI v3) requires organizations to implement strong password policies for their Identity and Access Management (IAM) users. This helps to protect sensitive credit card information and ensure secure access to systems and applications. In order to comply with the PCI v3 requirements, the following details define the necessary configurations for password policies for IAM users.
Policy Description
The password policy for IAM users should meet the following requirements:
Password Complexity: IAM users' passwords should contain a combination of uppercase and lowercase letters, numbers, and special characters. This requirement aims to create strong and complex passwords that are resistant to brute-force attacks.
Password Length: The minimum length of IAM users' passwords should be at least eight characters. Longer passwords are encouraged to provide increased security against password guessing attacks.
Password Expiration: IAM users' passwords should have a maximum validity period of 90 days. Regular password changes help minimize the impact of a compromised password.
Password History: The password history should be enabled with a restriction of preventing re-use of the last five passwords. This prevents users from using the same passwords repeatedly and promotes the use of unique and different passwords.
Account Lockout: Implement an account lockout policy for IAM users after six failed login attempts within a specified time frame (e.g., 30 minutes). The lockout duration should be a minimum of 30 minutes or until an administrator unlocks the account.
Troubleshooting Steps
1. Password Complexity Issues
2. Password Length Issues
3. Password Expiration Issues
4. Password History Issues
5. Account Lockout Issues
Necessary Codes (if applicable)
The following AWS CLI command can be used to update the password policy for IAM users:
aws iam update-account-password-policy --minimum-password-length 8 --require-symbols --require-numbers --require-uppercase-characters --require-lowercase-characters --max-password-age 90 --password-reuse-prevention 5 --hard-expiry
Step-by-Step Guide for Remediation
To configure the password policy for IAM users and meet the PCI v3 requirements, follow the step-by-step guide below:
Log in to the AWS Management Console.
Open the IAM console.
In the navigation pane, choose "Account settings."
Under the "Password policy" section, select the "Edit" button.
Configure the following settings to meet the PCI v3 requirements:
Select the "Apply password policy" button to save the changes.
Test the new password policy by creating a sample IAM user and ensuring that the password complexity, length, expiration, history, and account lockout features are correctly enforced.
By implementing and maintaining these password policies for IAM users, organizations can ensure compliance with the PCI v3 standard and enhance the overall security of their systems and customer data.