A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong
password
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
s and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of
security awareness training. Either the password policy is merely advisory, or the computer systems force users to comply with it. Some governments have national authentication frameworks that define requirements for user authentication to government services, including requirements for passwords.
NIST guidelines
The United States Department of Commerce's
National Institute of Standards and Technology
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
(NIST) has put out two standards for password policies which have been widely followed.
2004
From 2004, the "NIST Special Publication 800-63. Appendix A," advised people to use irregular capitalization, special characters, and at least one numeral. This was the advice that most systems followed, and was "baked into" a number of standards that businesses needed to follow.
2017
However, in 2017 a major update changed this advice, particularly that forcing complexity and regular changes is now seen as bad practice.
[ ]
The key points of these are:
* Verifiers ''shall not'' impose composition rules (e.g., not require mixtures of different character types and not prohibit consecutively repeated characters) (note that this was changed in revision 4 from ''should not'' to ''shall not'')
* Verifiers ''shall not'' require passwords to be changed arbitrarily or regularly (e.g. no 90-day or 365-day change rule)
* Passwords ''must'' be at least 8 characters in length
* Password systems ''should'' permit subscriber-chosen passwords at least 64 characters in length.
* All printing
ASCII
ASCII ( ), an acronym for American Standard Code for Information Interchange, is a character encoding standard for representing a particular set of 95 (English language focused) printable character, printable and 33 control character, control c ...
characters, the space character, and
Unicode
Unicode or ''The Unicode Standard'' or TUS is a character encoding standard maintained by the Unicode Consortium designed to support the use of text in all of the world's writing systems that can be digitized. Version 16.0 defines 154,998 Char ...
characters ''should'' be acceptable in passwords
* When establishing or changing passwords, the verifier ''shall'' advise the subscriber that they need to select a different password if they have chosen a weak or compromised password
* Verifiers ''should'' offer guidance such as a password-strength meter, to assist the user in choosing a strong password
* Verifiers ''shall'' store passwords in a form that is resistant to offline attacks. Passwords ''shall'' be
salted and hashed using a suitable one-way
key derivation function
In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function (which typically uses a cr ...
. Key derivation functions take a password, a salt, and a cost factor as inputs then generate a password hash. Their purpose is to make each password guessing trial by an attacker who has obtained a password hash file expensive and therefore the cost of a guessing attack high or prohibitive.
NIST included a rationale for the new guidelines in its Appendix A.
Aspects
Typical components of a password policy include:
Password length and formation
Many policies require a minimum password length. Eight characters is typical but may not be appropriate. Longer passwords are almost always more secure, but some systems impose a maximum length for compatibility with
legacy system
Legacy or Legacies may refer to:
Arts and entertainment
Comics
* " Batman: Legacy", a 1996 Batman storyline
* '' DC Universe: Legacies'', a comic book series from DC Comics
* ''Legacy'', a 1999 quarterly series from Antarctic Press
* ''Legacy ...
s.
Some policies suggest or impose requirements on what type of password a user can choose, such as:
*the use of both upper-case and lower-case letters (
case sensitivity)
*inclusion of one or more numerical digits
*inclusion of
special characters, such as @, #, $
*prohibition of words found in a password
blocklist
*prohibition of words found in the user's personal information
*prohibition of use of company name or an abbreviation
*prohibition of passwords that match the format of calendar dates,
license plate
A vehicle registration plate, also known as a number plate (British, Indian and Australian English), license plate (American English) or licence plate (Canadian English), is a metal or plastic plate attached to a motor vehicle or trailer for ...
numbers, telephone numbers, or other common numbers
Other systems create an initial password for the user; but require then to change it to one of their own choosing within a short interval.
Password block list
Password block lists are lists of passwords that are always blocked from use. Block lists contain passwords constructed of character combinations that otherwise meet company policy, but should no longer be used because they have been deemed insecure for one or more reasons, such as being easily guessed, following a common pattern, or public disclosure from previous
data breaches. Common examples are Password1, Qwerty123, or Qaz123wsx.
Password duration
Some policies require users to change passwords periodically, often every 90 or 180 days. The benefit of password expiration, however, is debatable.
[
] Systems that implement such policies sometimes prevent users from picking a password too close to a previous selection.
This policy can often backfire. Some users find it hard to devise "
good
In most contexts, the concept of good denotes the conduct that should be preferred when posed with a choice between possible actions. Good is generally considered to be the opposite of evil. The specific meaning and etymology of the term and its ...
" passwords that are also easy to remember, so if people are required to choose many passwords because they have to change them often, they end up using much weaker passwords; the policy also encourages users to write passwords down. Also, if the policy prevents a user from repeating a recent password, this requires that there is a database in existence of everyone's recent passwords (or their
hashes) instead of having the old ones erased from memory. Finally, users may change their password repeatedly within a few minutes, and then change back to the one they really want to use, circumventing the password change policy altogether.
The human aspects of passwords must also be considered. Unlike computers, human users cannot delete one memory and replace it with another. Consequently, frequently changing a memorized password is a strain on the human memory, and most users resort to choosing a password that is relatively easy to guess (See
Password fatigue
Password fatigue is the feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine, such as to log in to a computer at work, undo a bicycle lock or conduct banking from an autom ...
). Users are often advised to use
mnemonic
A mnemonic device ( ), memory trick or memory device is any learning technique that aids information retention or retrieval in the human memory, often by associating the information with something that is easier to remember.
It makes use of e ...
devices to remember complex passwords. However, if the password must be repeatedly changed, mnemonics are useless because the user would not remember which mnemonic to use. Furthermore, the use of mnemonics (leading to passwords such as "2BOrNot2B") makes the password easier to guess.
Administration factors can also be an issue. Users sometimes have older devices that require a password that was used before the password duration expired. In order to manage these older devices, users may have to resort to writing down all old passwords in case they need to log into an older device.
Requiring a very strong password and not requiring it be changed is often better. However, this approach does have a major drawback: if an unauthorized person acquires a password and uses it without being detected, that person may have access for an indefinite period.
It is necessary to weigh these factors: the likelihood of someone guessing a password because it is weak, versus the likelihood of someone managing to steal, or otherwise acquire without guessing, a stronger password.
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
argues that "pretty much anything that can be remembered can be cracked", and recommends a scheme that uses passwords which will not appear in any dictionaries.
Sanction
Password policies may include progressive sanctions beginning with warnings and ending with possible loss of computer privileges or job termination. Where confidentiality is mandated by law, e.g. with
classified information
Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
, a violation of password policy could be a criminal offense in some jurisdictions. Some consider a convincing explanation of the importance of security to be more effective than threats of sanctions.
Selection process
The level of password strength required depends, among other things, on how easy it is for an attacker to submit multiple guesses. Some systems limit the number of times a user can enter an incorrect password before some delay is imposed or the account is frozen. At the other extreme, some systems make available a
specially hashed version of the password, so that anyone can check its validity. When this is done, an attacker can try passwords very rapidly; so much stronger passwords are necessary for reasonable security. (See
password cracking and
password length equation.) Stricter requirements are also appropriate for accounts with higher privileges, such as root or system administrator accounts.
Usability considerations
Password policies are usually a tradeoff between theoretical security and the practicalities of human behavior. For example:
*Requiring excessively complex passwords and forcing them to be changed frequently can cause users to write passwords down in places that are easy for an intruder to find, such as a
Rolodex
A Rolodex is a rotating card file device used to store a contact list. Its name, a portmanteau of the words "rolling" and "index", has become somewhat genericized for any personal organizer performing this function, or as a metonym for a total a ...
or
post-it note
A Post-it note (or sticky note) is a small piece of paper with a re-adherable strip of glue on its back, made for temporarily attaching notes to documents and other surfaces. A low-adhesion, tack pressure-sensitive adhesive allows the notes to ...
near the computer.
*Users often have dozens of passwords to manage. It may be more realistic to recommend a single password be used for all low security applications, such as reading on-line newspapers and accessing entertainment web sites.
*Similarly, demanding that users never write down their passwords may be unrealistic and lead users to choose weak ones (or cause a lot of inconvenience when users forget their password). An alternative is to suggest keeping written passwords in a secure place, such as a
safe
A safe (also called a strongbox or coffer) is a secure lockable enclosure used for securing valuable objects against theft or fire. A safe is usually a hollow cuboid or cylinder, with one face being removable or hinged to form a door. The body ...
or an encrypted master file. The validity of this approach depends on what the most likely threat is deemed to be. While writing down a password may be problematic if potential attackers have access to the secure store, if the threat is primarily remote attackers who do not have access to the store, it can be a very secure method.
*Inclusion of special characters can be a problem if a user has to
log onto a computer in a different country. Some special characters may be difficult or impossible to find on keyboards designed for another language.
*Some
identity management
Identity and access management (IAM or IdAM) or Identity management (IdM), is a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate acce ...
systems allow
self-service password reset
Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without ...
, where users can bypass password security by supplying an answer to one or more
security question
A security question is a form of shared secret used as an authenticator. It is commonly used by banks, cable companies and wireless providers as an extra security layer.
History
Financial institutions have used questions to authenticate custo ...
s such as "where were you born?", "what's your favorite movie?", etc. Often the answers to these questions can easily be obtained by
social engineering,
phishing
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
or simple research.
A 2010 examination of the password policies of 75 different websites concludes that security only partly explains more stringent policies:
monopoly
A monopoly (from Greek language, Greek and ) is a market in which one person or company is the only supplier of a particular good or service. A monopoly is characterized by a lack of economic Competition (economics), competition to produce ...
providers of a service, such as government sites, have more stringent policies than sites where consumers have choice (e.g. retail sites and banks). The study concludes that sites with more stringent policies "do not have greater security concerns, they are simply better insulated from the consequences from poor usability."
Other approaches are available that are generally considered to be more secure than simple passwords. These include use of a
security token
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked door ...
or
one-time password
A one-time password (OTP), also known as a one-time PIN, one-time passcode, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital dev ...
system, such as
S/Key, or
multi-factor authentication
Multi-factor authentication (MFA; two-factor authentication, or 2FA) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more distinct types of evidence ...
. However, these systems heighten the tradeoff between security and convenience: according to
Shuman Ghosemajumder, these systems all improve security, but come "at the cost of moving the burden to the end user."
See also
*
Random password generator
*
Secure error messages in software systems
*
Single sign-on
References
{{DEFAULTSORT:Password Policy
Password authentication