MEDIUMCIS 1.9

Ensure IAM password policy requires minimum length of 14 or greater

Strong passwords are essential for security. Password length is the most important factor in password strength. A minimum length of 14 characters provides adequate protection against brute-force attacks.

Security Impact

Short passwords can be brute-forced in reasonable time with modern computing power.

How to Remediate

Update IAM password policy to require a minimum password length of 14 characters. Use AWS CLI: aws iam update-account-password-policy --minimum-password-length 14

Affected Resources

AWS::IAM::AccountPasswordPolicy

Compliance Frameworks

CIS AWS v1.5.0CIS AWS v2.0SOC 2NIST 800-53PCI-DSS

How TigerGate Helps

TigerGate continuously monitors your AWS environment to detect and alert on this misconfiguration. Here's what our platform does for this specific check:

  • Continuous Scanning

    Automatically scans all Identity and Access Management (IAM) resources across your AWS accounts every hour

  • Instant Alerts

    Get notified via Slack, email, or webhooks when this misconfiguration is detected

  • One-Click Remediation

    Fix this issue directly from the TigerGate dashboard with our guided remediation

  • Compliance Evidence

    Automatically collect audit evidence for CIS AWS v1.5.0, CIS AWS v2.0, SOC 2 compliance

  • Drift Detection

    Get alerted if this configuration drifts back to an insecure state after remediation

Check Details

Check ID
aws-iam-9
Service
Identity and Access Management (IAM)
Category
Password Policy
Severity
MEDIUM
CIS Benchmark
1.9

Automate This Check

TigerGate automatically scans your AWS environment for this and 575+ other security checks.

Start Free Trial