Have an Account?

Password Policy

Password Policy

Purpose:

Requirements:

Passwords require at least one of the following

  • 10 character minimum
  • 1 uppercase character
  • 1 lowercase character
  • 1 numeric character
  • 1 special character (!@#$%&?)

Passwords must be kept secret and must never be shared with anyone. 

Punitive:  Members found to share passwords will have their site privileges curbed or revoked.

A password policy is a set of rules and guidelines established by an organization to ensure the security and integrity of user passwords used to access systems, applications, and sensitive information. A well-defined password policy helps protect against unauthorized access, data breaches, and other security threats. Here are some key components that are typically included in a password policy:

  1. Password Complexity: Define requirements for password complexity, such as minimum length, use of uppercase and lowercase letters, numbers, and special characters. This makes passwords harder to guess or crack through brute-force attacks.

  2. Password History: Specify how often users are required to change their passwords and set a limit on the reuse of previous passwords. This prevents users from recycling the same passwords repeatedly.

  3. Password Expiration: Determine the interval after which passwords expire and need to be changed. Regular password changes reduce the risk of unauthorized access due to compromised credentials.

  4. Account Lockout: Set rules for automatically locking user accounts after a specified number of failed login attempts. This helps prevent brute-force attacks and unauthorized access attempts.

  5. Two-Factor Authentication (2FA): Encourage or mandate the use of two-factor authentication, where users need to provide a second form of verification in addition to their password. This adds an extra layer of security.

  6. Password Recovery: Specify guidelines for password recovery or reset processes to ensure that they are secure and not easily exploited by attackers.

  7. User Education: Provide clear instructions to users about the importance of creating strong passwords, the risks of sharing passwords, and how to securely manage their passwords.

  8. Password Storage: Define how passwords should be stored in the system's database. Best practices involve hashing and salting passwords to protect them from exposure in case of a data breach.

  9. Password Sharing and Sharing Policies: Discourage password sharing among users and outline the consequences of violating the policy. Encourage the use of individual accounts for accountability.

  10. Third-Party Applications: If your organization uses third-party applications or services, ensure that their password policies align with your organization's security standards.

  11. Regular Auditing and Compliance: Establish a mechanism to regularly audit and assess compliance with the password policy. This can help identify areas for improvement and ensure that users are following security guidelines.

  12. Enforcement and Consequences: Clearly state the consequences of violating the password policy, such as account suspension or loss of access privileges.

Implementing a robust password policy is a fundamental step in enhancing the overall cybersecurity posture of an organization. It helps safeguard sensitive data and systems by minimizing the risk of unauthorized access through compromised or weak passwords.