turbot/aws_compliance

Control: Password policies for IAM users should have strong configurations with minimum length of 8 or greater

Description

This control checks whether the account password policy for IAM users uses the recommended configurations.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.iam_account_password_policy_strong_min_length_8

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.iam_account_password_policy_strong_min_length_8 --share

SQL

This control uses a named query:

iam_account_password_policy_strong_min_length_8

Tags