Kloudle Logo
ACADEMY

How to enable Prevent Password Reuse policy in AWS

By Riyaz Walikar 2 min read intermediate level

Introduction

In the event of passwords being breached, a reused password can allow an attacker to take over a user account or compromise the entire AWS account.

Preventing password reuse increases account resiliency against brute force login attempts. AWS IAM password policies can prevent the reuse of a given password by the same user by enabling Prevent password reuse policy.

In the absence of this policy, there is no way to prevent users from reusing their old passwords after expiry or when password change operations are performed.

Here’s how you can enable Prevent Password Reuse policy on AWS via the console and CLI

Steps to enable Prevent Password Reuse policy via AWS console

https://www.youtube.com/watch?v=j4OO06TaQUs&t=17s

  1. Sign in to the AWS Management console

  2. Navigate to IAM service

    AWS Services

  3. On the left menu, click on Account settings

    AWS Account Settings

  4. Under Password Policy section, click on Change password policy button

    AWS Password Policy

  5. Check the Prevent password reuse checkbox

    AWS Prevent Password reuse

  6. For the password history, we can set the value between 1 and 24. As per CIS benchmark we should set this value to 24 or you can set it up as per your organization’s policies and processes

  7. Click on Save changes. This will enable the password policy to prevent reuse of old passwords

    AWS Modify Password Policy

Steps to enable Prevent Password Reuse policy via AWS CLI

https://www.youtube.com/watch?v=QoYvhwoHSjA&t=2s

  1. To check password policy manually, run get account password policy command

    aws iam get-account-password-policy
  2. We can see that this policy has not been enabled yet

    AWS IAM get account password policy

  3. Run update account password policy command on your terminal with password reuse prevention parameter value set to an integer between 1 and 24

    aws iam update-account-password-policy \
    --password-reuse-prevention 24

    (As per CIS benchmark we should set this value to 24 or you can set it up as per your organization’s policies and processes)

  4. To check if the policy has been updated, run the command in step 1 again

    AWS IAM password policy updated

Riyaz Walikar Founder & Chief of R&D

Riyaz Walikar

Founder & Chief of R&D

Riyaz is the founder and Chief of R&D at Kloudle, where he hunts for cloud misconfigurations so developers don’t have to. With over 15 years of experience breaking into systems, he’s led offensive security at PwC and product security across APAC for Citrix. Riyaz created the Kubernetes security testing methodology at Appsecco, blending frameworks like MITRE ATT&CK, OWASP, and PTES. He’s passionate about teaching people how to hack—and how to stay secure.