Other Articles

Prohibit Password Reuse

This check ensures that IAM users cannot reuse previously used passwords. Preventing password reuse strengthens account security and reduces the risk of compromised credentials being reused.

Check Details

  • Resource: General
  • Check: Prohibit password reuse
  • Risk: Reused passwords increase the risk of account compromise

Remediation via AWS Console

  1. Log in to the AWS Management Console and open the IAM console. AWS IAM Console
  2. In the left navigation panel, select Account settings. AWS IAM Account Setting
  3. Under Password policy, click Edit.
  4. Choose Custom password policy.
  5. Enable Prevent password reuse.
  6. Set Number of passwords to remember to 24. Password count policy
  7. Click Save changes.

Remediation via AWS CLI

  1. Log in to the AWS Management Console and click the CloudShell icon (>_) in the top-right corner. AWS CloudShell icon
  2. Update the account password policy to prevent password reuse:
    
    
    aws iam update-account-password-policy \
     --password-reuse-prevention 24