Ensure IAM password policy require expire passwords within 90 days - fix
IAM
Operational Excellence
Template will update the pwd policy with 90 days expiry of you IAM user passwords
Ensure IAM password policy require at least one symbol
IAM
CIS-AWS
Checks if IAM password policy require at least one symbol
Ensure IAM password policy require uppercase letter - fix
IAM
Operational Excellence
.
IAM Users - Admin Access and MFA Check
IAM
Security
Security
CIS-AWS
Sends a report of IAM users which have Admin access. Administrator access should be given to trusted users only.
Ensure IAM password policy require expire passwords within 90 days
IAM
CIS-AWS
Checks if IAM password policy require expire passwords within 90 days
Ensure a log metric filter and alarm exist for VPC changes
IAM
CIS-AWS
Checks if a log metric filter and alarm exist for VPC changes
Expired IAM Access Keys (90 Days)
IAM
CIS-AWS
Ensure credentials unused for 90 days or greater are disabled
Ensure IAM password policy prevents password reuse
CIS-AWS
IAM
Checks if IAM password policy prevents password reuse
Ensure IAM password policy require at least one number
CIS-AWS
IAM
Checks if IAM password policy require at least one number
Ensure IAM password policy require min length of 14
CIS-AWS
IAM
Checks if IAM password policy require min length of 14
Ensure IAM password policy require min length of 14 - fix
IAM
Operational Excellence
.
IAM Users with Unused Console Credentials
CIS-AWS
IAM
Ensure console credentials are rotated every 90 days or less
Ensure IAM password policy require at lowerCase letter
IAM
CIS-AWS
Checks if IAM password policy require lowerCase letter
Ensure IAM password policy require uppercase letter
CIS-AWS
IAM
Checks if IAM password policy require uppercase letter
Expired IAM Access Keys (90 Days)
IAM
Security
Security
Sends a report if your IAM user access keys are not changed in the past 90 days. Rotating the keys minimises the chance of malicious users gaining access to your account.