SlideShare a Scribd company logo
1 of 8
SANS Institute 2014– All Rights Reserved Page 1
Consensus Policy Resource Community
Password Protection Policy
Free Use Disclaimer: This policy was created by or for the
SANS Institute for the
Internet community. All or parts of this policy can be freely
used for your organization.
There is no prior approval required. If you would like to
contribute a new policy or
updated version of this policy, please send email to
[email protected]
Last Update Status: Updated October, 2017
1. Overview
Passwords are an important aspect of computer security. A
poorly chosen password may result
in unauthorized access and/or exploitation of our resources. All
staff, including contractors and
vendors with access to <Company Name> systems, are
responsible for taking the appropriate
steps, as outlined below, to select and secure their passwords.
2. Purpose
The purpose of this policy is to establish a standard for creation
of strong passwords and the
protection of those passwords.
3. Scope
The scope of this policy includes all personnel who have or are
responsible for an account (or
any form of access that supports or requires a password) on any
system that resides at any
<Company Name> facility, has access to the <Company Name>
network, or stores any non-
public <Company Name> information.
4. Policy
4.1 Password Creation
4.1.1 All user-level and system-level passwords must conform
to the Password Construction
Guidelines.
4.1.2 Users must use a separate, unique password for each of
their work related accounts.
Users may not use any work related passwords for their own,
personal accounts.
4.1.3 User accounts that have system-level privileges granted
through group memberships or
programs such as sudo must have a unique password from all
other accounts held by that
user to access system-level privileges. In addition, it is highly
recommend that some
form of multi-factor authentication is used for any privileged
accounts
4.2 Password Change
4.2.1 Passwords should be changed only when there is reason to
believe a password has been
compromised.
4.2.2 Password cracking or guessing may be performed on a
periodic or random basis by the
Infosec Team or its delegates. If a password is guessed or
cracked during one of these
mailto:[email protected]
SANS Institute 2014– All Rights Reserved Page 2
Consensus Policy Resource Community
scans, the user will be required to change it to be in compliance
with the Password
Construction Guidelines.
4.3 Password Protection
4.3.1 Passwords must not be shared with anyone, including
supervisors and coworkers. All
passwords are to be treated as sensitive, Confidential <Company
Name> information.
Corporate Information Security recognizes that legacy
applications do not support proxy
systems in place. Please refer to the technical reference for
additional details.
4.3.2 Passwords must not be inserted into email messages,
Alliance cases or other forms of
electronic communication, nor revealed over the phone to
anyone.
4.3.3 Passwords may be stored only in “password managers”
authorized by the organization.
4.3.4 Do not use the "Remember Password" feature of
applications (for example, web
browsers).
4.3.5 Any user suspecting that his/her password may have been
compromised must report the
incident and change all passwords.
4.4 Application Development
Application developers must ensure that their programs contain
the following security
precautions:
4.4.1 Applications must support authentication of individual
users, not groups.
4.4.2 Applications must not store passwords in clear text or in
any easily reversible form.
4.4.3 Applications must not transmit passwords in clear text
over the network.
4.4.4 Applications must provide for some sort of role
management, such that one user can take
over the functions of another without having to know the other's
password.
4.5 Multi-Factor Authentication
4.5.1 Multi-factor authentication is highly encouraged and
should be used whenever possible,
not only for work related accounts but personal accounts also.
5. Policy Compliance
5.1 Compliance Measurement
SANS Institute 2014– All Rights Reserved Page 3
Consensus Policy Resource Community
The Infosec team will verify compliance to this policy through
various methods, including but
not limited to, periodic walk-thrus, video monitoring, business
tool reports, internal and external
audits, and feedback to the policy owner.
5.2 Exceptions
Any exception to the policy must be approved by the Infosec
Team in advance.
5.3 Non-Compliance
An employee found to have violated this policy may be subject
to disciplinary action, up to and
including termination of employment.
6 Related Standards, Policies and Processes
• Password Construction Guidelines
7 Revision History
Date of Change Responsible Summary of Change
June 2014 SANS Policy Team Updated and converted to new
format.
October, 2017 SANS Policy Team Updated to confirm with new
NIST SP800-63.3
standards.
1. Overview2. Purpose3. Scope4. Policy4.1 Password
Creation4.1.1 All user-level and system-level passwords must
conform to the Password Construction Guidelines.4.1.2 Users
must use a separate, unique password for each of their work
related accounts. Users may not use any work related
passwords for their own, personal accounts.4.1.3 User accounts
that have system-level privileges granted through group
memberships or programs such as sudo must have a unique
password from all other accounts held by that user to access
system-level privileges. In addition, it is highly recomm...4.2
Password Change4.2.1 Passwords should be changed only when
there is reason to believe a password has been
compromised.4.2.2 Password cracking or guessing may be
performed on a periodic or random basis by the Infosec Team or
its delegates. If a password is guessed or cracked during one of
these scans, the user will be required to change it to be in
compliance with the...4.3 Password Protection4.3.1 Passwords
must not be shared with anyone, including supervisors and
coworkers. All passwords are to be treated as sensitive,
Confidential <Company Name> information. Corporate
Information Security recognizes that legacy applications do not
suppo...4.3.2 Passwords must not be inserted into email
messages, Alliance cases or other forms of electronic
communication, nor revealed over the phone to anyone.4.3.3
Passwords may be stored only in “password managers”
authorized by the organization.4.3.4 Do not use the "Remember
Password" feature of applications (for example, web
browsers).4.3.5 Any user suspecting that his/her password may
have been compromised must report the incident and change all
passwords.4.4 Application Development4.5 Multi-Factor
Authentication4.5.1 Multi-factor authentication is highly
encouraged and should be used whenever possible, not only for
work related accounts but personal accounts also.5. Policy
Compliance5.2 Exceptions5.3 Non-Compliance6 Related
Standards, Policies and Processes7 Revision History

More Related Content

Similar to SANS Institute 2014– All Rights Reserved Page 1 Consensu.docx

System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
aminpathan11
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
christinemaritza
 
Server Audit PolicyFree Use DisclaimerThis policy was created.docx
Server Audit PolicyFree Use DisclaimerThis policy was created.docxServer Audit PolicyFree Use DisclaimerThis policy was created.docx
Server Audit PolicyFree Use DisclaimerThis policy was created.docx
klinda1
 

Similar to SANS Institute 2014– All Rights Reserved Page 1 Consensu.docx (20)

Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
 
Explanation of the most common types of technical risks
Explanation of the most common types of technical risksExplanation of the most common types of technical risks
Explanation of the most common types of technical risks
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Get Ahead of your Next Security Breach
Get Ahead of your Next Security BreachGet Ahead of your Next Security Breach
Get Ahead of your Next Security Breach
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
Healthcare Compliance Software
Healthcare Compliance SoftwareHealthcare Compliance Software
Healthcare Compliance Software
 
Server Audit PolicyFree Use DisclaimerThis policy was created.docx
Server Audit PolicyFree Use DisclaimerThis policy was created.docxServer Audit PolicyFree Use DisclaimerThis policy was created.docx
Server Audit PolicyFree Use DisclaimerThis policy was created.docx
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
Password Management
Password ManagementPassword Management
Password Management
 
Sec440: Server Malware Protection Policy
Sec440: Server Malware Protection PolicySec440: Server Malware Protection Policy
Sec440: Server Malware Protection Policy
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
 

More from jeffsrosalyn

Problem 8-2B(a) Journalize the transactions, including explanation.docx
Problem 8-2B(a) Journalize the transactions, including explanation.docxProblem 8-2B(a) Journalize the transactions, including explanation.docx
Problem 8-2B(a) Journalize the transactions, including explanation.docx
jeffsrosalyn
 
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docx
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docxProblem 14-4AFinancial information for Ernie Bishop Company is pre.docx
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docx
jeffsrosalyn
 
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docxproblem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
jeffsrosalyn
 
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docxProblem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
jeffsrosalyn
 
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docxProblem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
jeffsrosalyn
 
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docxPROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
jeffsrosalyn
 
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docxProblem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
jeffsrosalyn
 
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docx
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docxProblem 1-2A (Part Level Submission)On August 31, the balance sh.docx
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docx
jeffsrosalyn
 
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docx
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docxProblem 1-2A (Part Level Submission)On August 31, the balance shee.docx
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docx
jeffsrosalyn
 
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docx
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docxPrior to engaging in this discussion, read Chapters 10 and 11 in y.docx
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docx
jeffsrosalyn
 
Primary Task Response Within the Discussion Board area, write 300.docx
Primary Task Response Within the Discussion Board area, write 300.docxPrimary Task Response Within the Discussion Board area, write 300.docx
Primary Task Response Within the Discussion Board area, write 300.docx
jeffsrosalyn
 

More from jeffsrosalyn (20)

Problem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docx
Problem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docxProblem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docx
Problem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docx
 
Problem 8-2B(a) Journalize the transactions, including explanation.docx
Problem 8-2B(a) Journalize the transactions, including explanation.docxProblem 8-2B(a) Journalize the transactions, including explanation.docx
Problem 8-2B(a) Journalize the transactions, including explanation.docx
 
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docx
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docxProblem 14-4AFinancial information for Ernie Bishop Company is pre.docx
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docx
 
Problem and solution essay  about the difficulties of speaking Engli.docx
Problem and solution essay  about the difficulties of speaking Engli.docxProblem and solution essay  about the difficulties of speaking Engli.docx
Problem and solution essay  about the difficulties of speaking Engli.docx
 
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docxproblem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
 
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docxProblem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
 
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docxProblem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
 
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docxPROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
 
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docxProblem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
 
Problem 13-6AIrwin Corporation has been authorized to issue 20,80.docx
Problem 13-6AIrwin Corporation has been authorized to issue 20,80.docxProblem 13-6AIrwin Corporation has been authorized to issue 20,80.docx
Problem 13-6AIrwin Corporation has been authorized to issue 20,80.docx
 
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docx
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docxProblem 1-2A (Part Level Submission)On August 31, the balance sh.docx
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docx
 
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docx
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docxProblem 1-2A (Part Level Submission)On August 31, the balance shee.docx
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docx
 
Prior to posting in this discussion, completeThe Parking Garage.docx
Prior to posting in this discussion, completeThe Parking Garage.docxPrior to posting in this discussion, completeThe Parking Garage.docx
Prior to posting in this discussion, completeThe Parking Garage.docx
 
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docx
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docxPrior to engaging in this discussion, read Chapters 10 and 11 in y.docx
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docx
 
Privacy in a Technological AgePrivacy protection is a hot top.docx
Privacy in a Technological AgePrivacy protection is a hot top.docxPrivacy in a Technological AgePrivacy protection is a hot top.docx
Privacy in a Technological AgePrivacy protection is a hot top.docx
 
Privacy Introduction Does the technology today Pene.docx
Privacy Introduction Does the technology today Pene.docxPrivacy Introduction Does the technology today Pene.docx
Privacy Introduction Does the technology today Pene.docx
 
Prisoner rights in America are based largely on the provisions of th.docx
Prisoner rights in America are based largely on the provisions of th.docxPrisoner rights in America are based largely on the provisions of th.docx
Prisoner rights in America are based largely on the provisions of th.docx
 
Principles of Supply and Demanda brief example of supply and deman.docx
Principles of Supply and Demanda brief example of supply and deman.docxPrinciples of Supply and Demanda brief example of supply and deman.docx
Principles of Supply and Demanda brief example of supply and deman.docx
 
Primary Task Response Within the Discussion Board area, write 300.docx
Primary Task Response Within the Discussion Board area, write 300.docxPrimary Task Response Within the Discussion Board area, write 300.docx
Primary Task Response Within the Discussion Board area, write 300.docx
 
Pretend you are a British government official during the time leadin.docx
Pretend you are a British government official during the time leadin.docxPretend you are a British government official during the time leadin.docx
Pretend you are a British government official during the time leadin.docx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

SANS Institute 2014– All Rights Reserved Page 1 Consensu.docx

  • 1. SANS Institute 2014– All Rights Reserved Page 1 Consensus Policy Resource Community Password Protection Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is no prior approval required. If you would like to contribute a new policy or updated version of this policy, please send email to [email protected] Last Update Status: Updated October, 2017 1. Overview Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of our resources. All staff, including contractors and vendors with access to <Company Name> systems, are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.
  • 2. 2. Purpose The purpose of this policy is to establish a standard for creation of strong passwords and the protection of those passwords. 3. Scope The scope of this policy includes all personnel who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any <Company Name> facility, has access to the <Company Name> network, or stores any non- public <Company Name> information. 4. Policy 4.1 Password Creation 4.1.1 All user-level and system-level passwords must conform to the Password Construction Guidelines. 4.1.2 Users must use a separate, unique password for each of their work related accounts. Users may not use any work related passwords for their own, personal accounts. 4.1.3 User accounts that have system-level privileges granted
  • 3. through group memberships or programs such as sudo must have a unique password from all other accounts held by that user to access system-level privileges. In addition, it is highly recommend that some form of multi-factor authentication is used for any privileged accounts 4.2 Password Change 4.2.1 Passwords should be changed only when there is reason to believe a password has been compromised. 4.2.2 Password cracking or guessing may be performed on a periodic or random basis by the Infosec Team or its delegates. If a password is guessed or cracked during one of these mailto:[email protected] SANS Institute 2014– All Rights Reserved Page 2 Consensus Policy Resource Community scans, the user will be required to change it to be in compliance with the Password
  • 4. Construction Guidelines. 4.3 Password Protection 4.3.1 Passwords must not be shared with anyone, including supervisors and coworkers. All passwords are to be treated as sensitive, Confidential <Company Name> information. Corporate Information Security recognizes that legacy applications do not support proxy systems in place. Please refer to the technical reference for additional details. 4.3.2 Passwords must not be inserted into email messages, Alliance cases or other forms of electronic communication, nor revealed over the phone to anyone. 4.3.3 Passwords may be stored only in “password managers” authorized by the organization. 4.3.4 Do not use the "Remember Password" feature of applications (for example, web browsers). 4.3.5 Any user suspecting that his/her password may have been compromised must report the incident and change all passwords.
  • 5. 4.4 Application Development Application developers must ensure that their programs contain the following security precautions: 4.4.1 Applications must support authentication of individual users, not groups. 4.4.2 Applications must not store passwords in clear text or in any easily reversible form. 4.4.3 Applications must not transmit passwords in clear text over the network. 4.4.4 Applications must provide for some sort of role management, such that one user can take over the functions of another without having to know the other's password. 4.5 Multi-Factor Authentication 4.5.1 Multi-factor authentication is highly encouraged and should be used whenever possible, not only for work related accounts but personal accounts also. 5. Policy Compliance 5.1 Compliance Measurement
  • 6. SANS Institute 2014– All Rights Reserved Page 3 Consensus Policy Resource Community The Infosec team will verify compliance to this policy through various methods, including but not limited to, periodic walk-thrus, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner. 5.2 Exceptions Any exception to the policy must be approved by the Infosec Team in advance. 5.3 Non-Compliance An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. 6 Related Standards, Policies and Processes • Password Construction Guidelines 7 Revision History Date of Change Responsible Summary of Change June 2014 SANS Policy Team Updated and converted to new
  • 7. format. October, 2017 SANS Policy Team Updated to confirm with new NIST SP800-63.3 standards. 1. Overview2. Purpose3. Scope4. Policy4.1 Password Creation4.1.1 All user-level and system-level passwords must conform to the Password Construction Guidelines.4.1.2 Users must use a separate, unique password for each of their work related accounts. Users may not use any work related passwords for their own, personal accounts.4.1.3 User accounts that have system-level privileges granted through group memberships or programs such as sudo must have a unique password from all other accounts held by that user to access system-level privileges. In addition, it is highly recomm...4.2 Password Change4.2.1 Passwords should be changed only when there is reason to believe a password has been compromised.4.2.2 Password cracking or guessing may be performed on a periodic or random basis by the Infosec Team or its delegates. If a password is guessed or cracked during one of these scans, the user will be required to change it to be in compliance with the...4.3 Password Protection4.3.1 Passwords must not be shared with anyone, including supervisors and coworkers. All passwords are to be treated as sensitive, Confidential <Company Name> information. Corporate Information Security recognizes that legacy applications do not suppo...4.3.2 Passwords must not be inserted into email messages, Alliance cases or other forms of electronic communication, nor revealed over the phone to anyone.4.3.3 Passwords may be stored only in “password managers” authorized by the organization.4.3.4 Do not use the "Remember Password" feature of applications (for example, web browsers).4.3.5 Any user suspecting that his/her password may
  • 8. have been compromised must report the incident and change all passwords.4.4 Application Development4.5 Multi-Factor Authentication4.5.1 Multi-factor authentication is highly encouraged and should be used whenever possible, not only for work related accounts but personal accounts also.5. Policy Compliance5.2 Exceptions5.3 Non-Compliance6 Related Standards, Policies and Processes7 Revision History