Control: Ensure IAM password policy expires passwords within 90 days or less
IAM password policies can require passwords to be rotated or expired after a given number of days. Security Hub recommends that the password policy expire passwords after 90 days or less. Reducing the password lifetime increases account resiliency against brute force login attempts.
Run the control in your terminal:
steampipe check terraform_aws_compliance.control.iam_password_policy_expire_90
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share terraform_aws_compliance.control.iam_password_policy_expire_90
This control uses a named query:iam_password_policy_expire_90