SlideShare a Scribd company logo
1 of 3
<Document classification> <Version History>
<Company Name><Business Unit> - Password Policy
1. Overview
All IT systems of <Company Name> and managed by <business unit> are protected with a username and
password for authorized and protected usage.This policy is owned by <team name> reporting into <business
unit> or the board of <company name>.Any queries, questions or assistance to this policy has to be
communicated to <email link of info sec lead or team mailing group>.
2. Purpose
The purpose of this policy is to establish a standard for the management of password for <business unit>
approved IT systems. This policy defines the password construction requirement, its usage, data classification
for the password, complexity, end user responsibility, system owner responsibility, incident reporting and review
mechanism.
3. Scope
This policy is in scope for any application, server, network device or other electronic equipment owned or
sanctioned by the <IT lead of Company Name> as approved for business use of <Company Name>, connected
to the <Company Name> network or electronic locations where <Company Name> business information is
stored.
4. Policy
 All passwords must be changed on or before <n> number of days.
 All passwords for systems defined as critical systems must be changed every <m> number of days.
 IT systems implemented for <Company Name> should have passwords that expire in <x> number of
days.
 The user account for the IT system should be locked after <h> number of invalid attempts.This number
should be derived based on the information risk management process <link to information risk
management process>.
 User accounts or system accounts for which the password is not changed before the due date must be
monitored and sufficient level of non-usage of the system with that account should be set.
 Passwords should not be shared with untrusted persons using any method of communication.
5. Password Management
5.1.a Password Construct – User responsibility
To ensure confidentality and a strong defense, the password chosen by you should meet the following
requirements:
 The length of the password should be more than eight characters.
 The password that you chose should not be easily predictable or guessable.
 The password should contain alphabets, numbers and special characters <specify permissible
characters here>
5.1.b Password Construct – System owner responsibility
The IT system owner is accountable for implementing the standards defined in this policy
Though there is no specific guidelines on how it should be implemented, it is expected that clearly defined
processes, steps or secure automation be in place for the password policy to be operational and effective. The
system owners can consult, review and have the methods evaluated with the information security team prior to
its implementation.
<Document classification> <Version History>
For a system that is classified as critical, the system owner must have the user account management
implementation reviewed by <info sec team name> and approved by <info sec lead position>, <technology lead
position> and/or <business continuity lead>.
5.2 Password data classification
Passwords are classified as <data classification label> in <Company Name>.The details of this classification is
provided in <link to information security policy>.In compliance to this data classification, the protection standards
are provided in section 5.3
5.3 Password Protection Standards
The password is provided as a first time use to an authorized employee after identifying and validating the
employee.The secure method of providing the password to the user account owner is the responsibility of the IT
system owner.The IT system must enforce a password change on first time logon.
To ensure that the password is not compromised, the following guidelines are set:
 Do not store <Company Name> account passwords on personal electronic devices or <Company
Name> owned IT assets in plain text.
 Passwords can be stored in encrypted format that comply with the encryption standards that are defined
in the document <link to encryption policy or standard>
 Any other non-compliant method of storing the password needs to be reviewed and approved by the
<info sec team name>
 An IT system should not cache or store <x> number of previously used password for a specific account.
 A secure method of transmission has to be implemented by the IT system owner for transmitting the
password.
5.4 Policy compliance
The password policy compliance is regularly monitored by the <info sec team>.Any type of exceptions will need
to be reviewed by <info sec team> and approved by the respective authority based on the exception.The
exception can be based on, but not limited to - employee (HR lead title), definition of the system (IT lead title),
business (business lead title), legal requirement (legal lead title), financial or regulatory (finance lead title).
Non-compliance would be logged and reviewed further and corrective action would be prescribed and
communicated by the <info sec team>.
6. Incident reporting
It is the responsibility of the employee to report any type of misplaced,unwarranted or misuse of the password of
any of the IT systems. This would include but not limited to:
a. Forgotten password
b. Password compromise in any manner
c. System password store hack
For a and b, the authorized user can utilize the IT incident reporting. In the case of c, the IT system owner, <IT
lead title>, <Info Sec lead title>, <business continuity lead title> have to be informed immediately.
7. Roles and Responsibilities
The RACI matrix in this section specifies the activities involved in the password management.
<Document classification> <Version History>
<ITleadtitle>
<InfoSeclead
title>
<SystemOwner>
<InfoSecteam>
<Authorizeduser>
Password Policy definition R A C R I
Selection of password A
System implementation of password R R A C I
Policy compliance monitoring I A I R
Incident reporting (Type a and b) A
Incident reporting (Type c) A
Policy review A A A R
R - Responsible; A - Accountable
C- Consulted;I - Informed
8. Policy Review
This policy is subject to the audit requirements specified by <audit team name>. Any changes to this policy will
comply with the change management process as set by <link to business or IT change management process>.
This policy is maintained in compliance with <link to version control management system>
8.1 Policy review history
Review Date Reviewed By Description of change

More Related Content

What's hot

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgEric Vanderburg
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

What's hot (20)

It Policies
It PoliciesIt Policies
It Policies
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Passwordless auth
Passwordless authPasswordless auth
Passwordless auth
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Iso 27001
Iso 27001Iso 27001
Iso 27001
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 

Viewers also liked

HAVEN Password Policy
HAVEN Password PolicyHAVEN Password Policy
HAVEN Password PolicyAce McGinnis
 
The Windows Password Policy is Not Enough
The Windows Password Policy is Not EnoughThe Windows Password Policy is Not Enough
The Windows Password Policy is Not EnoughnFront Security
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregonJulie Bozzi, PfPM, PMP
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domainamiable_indian
 
How a Windows Password Filters Works
How a Windows Password Filters WorksHow a Windows Password Filters Works
How a Windows Password Filters WorksnFront Security
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]LinkedIn
 

Viewers also liked (9)

HAVEN Password Policy
HAVEN Password PolicyHAVEN Password Policy
HAVEN Password Policy
 
The Windows Password Policy is Not Enough
The Windows Password Policy is Not EnoughThe Windows Password Policy is Not Enough
The Windows Password Policy is Not Enough
 
Physical security
Physical securityPhysical security
Physical security
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregon
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
How a Windows Password Filters Works
How a Windows Password Filters WorksHow a Windows Password Filters Works
How a Windows Password Filters Works
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 

Similar to Password policy template

Discussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatDiscussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatLyndonPelletier761
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business AccountsAnayaGrewal
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxtodd331
 
Level 3 lsr tech solutions employee system access
Level 3 lsr tech solutions employee system accessLevel 3 lsr tech solutions employee system access
Level 3 lsr tech solutions employee system accessjoeblow1234
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and CompliancePortalGuard
 
Week - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docxWeek - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docxmelbruce90096
 
Real estate management system
Real estate management systemReal estate management system
Real estate management systemSouvikSarkar75
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STakishaPeck109
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
Access control policy
Access control policyAccess control policy
Access control policyBsmah Fahad
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxJoshJaro
 

Similar to Password policy template (20)

Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Discussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatDiscussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relat
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
Policy and procedure
Policy and procedurePolicy and procedure
Policy and procedure
 
CyberArk
CyberArkCyberArk
CyberArk
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
Level 3 lsr tech solutions employee system access
Level 3 lsr tech solutions employee system accessLevel 3 lsr tech solutions employee system access
Level 3 lsr tech solutions employee system access
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and Compliance
 
Week - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docxWeek - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docx
 
Real estate management system
Real estate management systemReal estate management system
Real estate management system
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Access control policy
Access control policyAccess control policy
Access control policy
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

Password policy template

  • 1. <Document classification> <Version History> <Company Name><Business Unit> - Password Policy 1. Overview All IT systems of <Company Name> and managed by <business unit> are protected with a username and password for authorized and protected usage.This policy is owned by <team name> reporting into <business unit> or the board of <company name>.Any queries, questions or assistance to this policy has to be communicated to <email link of info sec lead or team mailing group>. 2. Purpose The purpose of this policy is to establish a standard for the management of password for <business unit> approved IT systems. This policy defines the password construction requirement, its usage, data classification for the password, complexity, end user responsibility, system owner responsibility, incident reporting and review mechanism. 3. Scope This policy is in scope for any application, server, network device or other electronic equipment owned or sanctioned by the <IT lead of Company Name> as approved for business use of <Company Name>, connected to the <Company Name> network or electronic locations where <Company Name> business information is stored. 4. Policy  All passwords must be changed on or before <n> number of days.  All passwords for systems defined as critical systems must be changed every <m> number of days.  IT systems implemented for <Company Name> should have passwords that expire in <x> number of days.  The user account for the IT system should be locked after <h> number of invalid attempts.This number should be derived based on the information risk management process <link to information risk management process>.  User accounts or system accounts for which the password is not changed before the due date must be monitored and sufficient level of non-usage of the system with that account should be set.  Passwords should not be shared with untrusted persons using any method of communication. 5. Password Management 5.1.a Password Construct – User responsibility To ensure confidentality and a strong defense, the password chosen by you should meet the following requirements:  The length of the password should be more than eight characters.  The password that you chose should not be easily predictable or guessable.  The password should contain alphabets, numbers and special characters <specify permissible characters here> 5.1.b Password Construct – System owner responsibility The IT system owner is accountable for implementing the standards defined in this policy Though there is no specific guidelines on how it should be implemented, it is expected that clearly defined processes, steps or secure automation be in place for the password policy to be operational and effective. The system owners can consult, review and have the methods evaluated with the information security team prior to its implementation.
  • 2. <Document classification> <Version History> For a system that is classified as critical, the system owner must have the user account management implementation reviewed by <info sec team name> and approved by <info sec lead position>, <technology lead position> and/or <business continuity lead>. 5.2 Password data classification Passwords are classified as <data classification label> in <Company Name>.The details of this classification is provided in <link to information security policy>.In compliance to this data classification, the protection standards are provided in section 5.3 5.3 Password Protection Standards The password is provided as a first time use to an authorized employee after identifying and validating the employee.The secure method of providing the password to the user account owner is the responsibility of the IT system owner.The IT system must enforce a password change on first time logon. To ensure that the password is not compromised, the following guidelines are set:  Do not store <Company Name> account passwords on personal electronic devices or <Company Name> owned IT assets in plain text.  Passwords can be stored in encrypted format that comply with the encryption standards that are defined in the document <link to encryption policy or standard>  Any other non-compliant method of storing the password needs to be reviewed and approved by the <info sec team name>  An IT system should not cache or store <x> number of previously used password for a specific account.  A secure method of transmission has to be implemented by the IT system owner for transmitting the password. 5.4 Policy compliance The password policy compliance is regularly monitored by the <info sec team>.Any type of exceptions will need to be reviewed by <info sec team> and approved by the respective authority based on the exception.The exception can be based on, but not limited to - employee (HR lead title), definition of the system (IT lead title), business (business lead title), legal requirement (legal lead title), financial or regulatory (finance lead title). Non-compliance would be logged and reviewed further and corrective action would be prescribed and communicated by the <info sec team>. 6. Incident reporting It is the responsibility of the employee to report any type of misplaced,unwarranted or misuse of the password of any of the IT systems. This would include but not limited to: a. Forgotten password b. Password compromise in any manner c. System password store hack For a and b, the authorized user can utilize the IT incident reporting. In the case of c, the IT system owner, <IT lead title>, <Info Sec lead title>, <business continuity lead title> have to be informed immediately. 7. Roles and Responsibilities The RACI matrix in this section specifies the activities involved in the password management.
  • 3. <Document classification> <Version History> <ITleadtitle> <InfoSeclead title> <SystemOwner> <InfoSecteam> <Authorizeduser> Password Policy definition R A C R I Selection of password A System implementation of password R R A C I Policy compliance monitoring I A I R Incident reporting (Type a and b) A Incident reporting (Type c) A Policy review A A A R R - Responsible; A - Accountable C- Consulted;I - Informed 8. Policy Review This policy is subject to the audit requirements specified by <audit team name>. Any changes to this policy will comply with the change management process as set by <link to business or IT change management process>. This policy is maintained in compliance with <link to version control management system> 8.1 Policy review history Review Date Reviewed By Description of change