You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
The App Defense Alliance Cloud Profile requires a check that AWS remembers and prohibits the use of 24 past passwords (this is the maximum number supported by AWS at this time). This rule will be very similar to "iam-password-policy-reuse-enabled", except that that rule only requires that some number of past passwords are banned, not that it is exactly 24.
Is your feature request related to a problem? Please describe.
The App Defense Alliance Cloud Profile requires a check that AWS remembers and prohibits the use of 24 past passwords (this is the maximum number supported by AWS at this time). This rule will be very similar to "iam-password-policy-reuse-enabled", except that that rule only requires that some number of past passwords are banned, not that it is exactly 24.
Describe the solution you'd like
Implement the check as documented at https://github.com/appdefensealliance/ASA-WG/blob/v1.0/Cloud%20App%20and%20Config%20Profile/Cloud%20App%20and%20Config%20Test%20Guide.md#291-ensure-iam-password-policy-prevents-password-reuse. This can probably be achieved by parameterizing "iam-password-policy-reuse-enabled".
The text was updated successfully, but these errors were encountered: