Severity Framework
Snyk CCSS
Rule category
IAM / Passwords
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
CIS-Controls
CSA-CCM
- Snyk ID SNYK-CC-00274
- credit Snyk Research Team
Description
IAM password policies can require passwords to be rotated or expired after a given number of days. Reducing the password lifetime increases account resiliency against brute force login attempts.
How to fix?
Set the aws_iam_account_password_policy
max_password_age
field to 90
or less.
Example Configuration
resource "aws_iam_account_password_policy" "example" {
max_password_age = 30
# other required fields here
}