Ensure AWS Identity and Access Management (IAM) user passwords are reset before expiration (45 Days)
Risk Level: Low
Cloud Entity: IAM User
CloudGuard Rule ID: D9.AWS.LOG.26
Covered by Spectral: No
Category: Security, Identity, & Compliance
GSL LOGIC
IamUser should have passwordNextRotation <= 45REMEDIATION
From Portal
- Navigate to your AWS Identity and Access Management (IAM) dashboard.\
- Within the navigation panel, select 'Credential Report'\
- Click the 'Download Report' option to access a comprehensive list of all your AWS account users along with the status of their various credentials.\
- Open the downloaded file\
- Examine the 'password_next_rotation' column value for each listed AWS IAM user.\
- Verify if the 'password_next_rotation' value indicates a timeframe of fewer than 45 days, ensuring
that password rotations are scheduled within the recommended security threshold.
From Command Line
To Retrieve the IAM Credential Report:
aws iam get-credential-reportTo Decode and Save the Report as a CSV File:
echo -n 'YOUR_CONTENT'| base64 -d >> aws-iam-credentials-report.csvTo Set a Valid Password Policy:
aws iam update-account-password-policy --allow-users-to-change-password --max-password-age 30References
- https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users.html
- https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_account-policy.html
IAM User
An IAM user is an entity that you create in AWS to represent the person or service that uses it to interact with AWS. A user in AWS consists of a name and credentials.
Compliance Frameworks
- CloudGuard AWS All Rules Ruleset
Updated 7 months ago