logo

277 Weak credential policy - Password Expiration


Description

The AWS IAM (Identity and Access Management) policy has the Enable password expiration flag set to disable, good security practices suggest that credentials should be renewed in 90 day periods.


Impact

Leak of credentials that can be used for further attacks.


Recommendation

- Establish credential policies following the requirements of the different security and cloud standards. - Credentials should have an expiration time limit to mitigate possible leakage.


Threat

External attacker with unauthorized credentials.


Expected Remediation Time

30 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: L
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: N
  • Confidentiality (VC): N
  • Integrity (VI): L
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: X

Requirements


Fixes


Last updated

2024/02/18