Control: Password policies for IAM users should have strong configurations with minimum length of 8 or greater
Description
This control checks whether the account password policy for IAM users uses the recommended configurations.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.iam_account_password_policy_strong_min_length_8
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.iam_account_password_policy_strong_min_length_8 --share
SQL
This control uses a named query:
iam_account_password_policy_strong_min_length_8