Profile Applicability: Level 1


Description: 

IAM password policies can prevent the reuse of a given password by the same user. It is recommended that the password policy prevent the reuse of passwords.


Rationale: 

Preventing password reuse increases account resiliency against brute force login attempts.


Audit: 

Perform the following to ensure the password policy is configured as prescribed: Via AWS Console 

1. Login to AWS Console (with appropriate permissions to View Identity Access Management Account Settings) 

2. Go to IAM Service on the AWS Console 

3. Click on Account Settings on the Left Pane 

4. Ensure "Prevent password reuse" is checked 

5. Ensure "Number of passwords to remember" is set to 24


Remediation:

Perform the following to set the password policy as prescribed:

Using AWS Console

    1. Login to AWS Console (with appropriate permissions to View Identity Access Management Account Settings)

    2. Go to IAM Service on the AWS Console

    3. Click on Account Settings on the Left Pane

    4. Check "Prevent password reuse" 

    5. Set "Number of passwords to remember" is set to 24


References: 

    1. CCE-78908-1


CIS Controls:

4.4 Use Unique Passwords

Where multi-factor authentication is not supported (such as local administrator, root, or service accounts), accounts will use passwords that are unique to that system.