IA-5(1)—Authenticator Management | Password-based Authentication
>Control Description
>DoD Impact Level Requirements
DoD FedRAMP+ Parameters
DSPAV must be used.
Additional Requirements and Guidance
IA-5 (1) Requirement: Password policies must be compliant with NIST SP 800-63B for all memorized, lookup, out-of-band, or One-Time-Passwords (OTP). Password policies shall not enforce special character or minimum password rotation requirements for memorized secrets of users. IA-5 (1) (h) Requirement: For cases where technology doesn't allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters. For emergency use accounts, these rules should be enforced: must have a minimum length of 14 characters, must support all printable ASCII characters, and passwords must be changed if used. IA-5 (1) Guidance: Note that (c) and (d) require the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13.)
>Discussion
Password-based authentication applies to passwords regardless of whether they are used in single-factor or multi-factor authentication. Long passwords or passphrases are preferable over shorter passwords. Enforced composition rules provide marginal security benefits while decreasing usability.
However, organizations may choose to establish certain rules for password generation (e.g., minimum character length for long passwords) under certain circumstances and can enforce this requirement in IA-5(1)(h). Account recovery can occur, for example, in situations when a password is forgotten. Cryptographically protected passwords include salted one-way cryptographic hashes of passwords.
The list of commonly used, compromised, or expected passwords includes passwords obtained from previous breach corpuses, dictionary words, and repetitive or sequential characters. The list includes context-specific words, such as the name of the service, username, and derivatives thereof.
>Programmatic Queries
Related Services
CLI Commands
aws iam update-login-profile --user-name USERNAME --password NEW_PASSWORD --password-reset-requiredaws iam get-account-password-policy --output jsonaws iam update-account-password-policy --minimum-password-length 14 --require-symbols --require-numbers --require-uppercase-characters --require-lowercase-characters --allow-users-to-change-password>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of IA-5(1) (Password-Based Authentication)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring IA-5(1)?
- •How frequently is the IA-5(1) policy reviewed and updated, and what triggers policy changes?
- •What governance structure ensures IA-5(1) requirements are consistently applied across all systems?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce IA-5(1) requirements.
- •What automated tools, systems, or technologies are deployed to implement IA-5(1)?
- •How is IA-5(1) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce IA-5(1) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of IA-5(1)?
- •What audit logs, records, reports, or monitoring data validate IA-5(1) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of IA-5(1) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate IA-5(1) compliance?
Ask AI
Configure your API key to use AI features.