After enabling IAM database authentication for Cloud SQL PostgreSQL, our password policy enforcement stopped working for database users. We have compliance requirements for 90-day password rotation and complexity rules, but IAM-authenticated users bypass these policies completely.
Our security compliance mandates require all database accounts to enforce password expiration, minimum 12-character length, and complexity requirements. IAM database authentication seems to circumvent the traditional PostgreSQL password policies we had configured. Users can authenticate with IAM credentials that don’t meet our database password standards.
How do we maintain password policy enforcement while using IAM authentication? The compliance risk is significant if we can’t demonstrate password controls for audit purposes.