Severity Framework
Snyk CCSS
Rule category
IAM / Passwords
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
AWS-Well-Architected
CIS-AWS
CIS-Controls
CSA-CCM
HIPAA
NIST-800-53
SOC-2
- Snyk ID SNYK-CC-00015
- credit Snyk Research Team
Description
Setting a password complexity policy that requires at least one number increases account resiliency against brute force login attempts.
How to fix?
Set the aws_iam_account_password_policy
require_numbers
field to true
.
Example Configuration
resource "aws_iam_account_password_policy" "example" {
require_numbers = true
# other required fields here
}