SlideShare a Scribd company logo
1 of 8
SANS Institute 2014– All Rights Reserved Page 1
Consensus Policy Resource Community
Password Protection Policy
Free Use Disclaimer: This policy was created by or for the
SANS Institute for the
Internet community. All or parts of this policy can be freely
used for your organization.
There is no prior approval required. If you would like to
contribute a new policy or
updated version of this policy, please send email to
[email protected]
Last Update Status: Updated October, 2017
1. Overview
Passwords are an important aspect of computer security. A
poorly chosen password may result
in unauthorized access and/or exploitation of our resources. All
staff, including contractors and
vendors with access to <Company Name> systems, are
responsible for taking the appropriate
steps, as outlined below, to select and secure their passwords.
2. Purpose
The purpose of this policy is to establish a standard for creation
of strong passwords and the
protection of those passwords.
3. Scope
The scope of this policy includes all personnel who have or are
responsible for an account (or
any form of access that supports or requires a password) on any
system that resides at any
<Company Name> facility, has access to the <Company Name>
network, or stores any non-
public <Company Name> information.
4. Policy
4.1 Password Creation
4.1.1 All user-level and system-level passwords must conform
to the Password Construction
Guidelines.
4.1.2 Users must use a separate, unique password for each of
their work related accounts.
Users may not use any work related passwords for their own,
personal accounts.
4.1.3 User accounts that have system-level privileges granted
through group memberships or
programs such as sudo must have a unique password from all
other accounts held by that
user to access system-level privileges. In addition, it is highly
recommend that some
form of multi-factor authentication is used for any privileged
accounts
4.2 Password Change
4.2.1 Passwords should be changed only when there is reason to
believe a password has been
compromised.
4.2.2 Password cracking or guessing may be performed on a
periodic or random basis by the
Infosec Team or its delegates. If a password is guessed or
cracked during one of these
mailto:[email protected]
SANS Institute 2014– All Rights Reserved Page 2
Consensus Policy Resource Community
scans, the user will be required to change it to be in compliance
with the Password
Construction Guidelines.
4.3 Password Protection
4.3.1 Passwords must not be shared with anyone, including
supervisors and coworkers. All
passwords are to be treated as sensitive, Confidential <Company
Name> information.
Corporate Information Security recognizes that legacy
applications do not support proxy
systems in place. Please refer to the technical reference for
additional details.
4.3.2 Passwords must not be inserted into email messages,
Alliance cases or other forms of
electronic communication, nor revealed over the phone to
anyone.
4.3.3 Passwords may be stored only in “password managers”
authorized by the organization.
4.3.4 Do not use the "Remember Password" feature of
applications (for example, web
browsers).
4.3.5 Any user suspecting that his/her password may have been
compromised must report the
incident and change all passwords.
4.4 Application Development
Application developers must ensure that their programs contain
the following security
precautions:
4.4.1 Applications must support authentication of individual
users, not groups.
4.4.2 Applications must not store passwords in clear text or in
any easily reversible form.
4.4.3 Applications must not transmit passwords in clear text
over the network.
4.4.4 Applications must provide for some sort of role
management, such that one user can take
over the functions of another without having to know the other's
password.
4.5 Multi-Factor Authentication
4.5.1 Multi-factor authentication is highly encouraged and
should be used whenever possible,
not only for work related accounts but personal accounts also.
5. Policy Compliance
5.1 Compliance Measurement
SANS Institute 2014– All Rights Reserved Page 3
Consensus Policy Resource Community
The Infosec team will verify compliance to this policy through
various methods, including but
not limited to, periodic walk-thrus, video monitoring, business
tool reports, internal and external
audits, and feedback to the policy owner.
5.2 Exceptions
Any exception to the policy must be approved by the Infosec
Team in advance.
5.3 Non-Compliance
An employee found to have violated this policy may be subject
to disciplinary action, up to and
including termination of employment.
6 Related Standards, Policies and Processes
• Password Construction Guidelines
7 Revision History
Date of Change Responsible Summary of Change
June 2014 SANS Policy Team Updated and converted to new
format.
October, 2017 SANS Policy Team Updated to confirm with new
NIST SP800-63.3
standards.
1. Overview2. Purpose3. Scope4. Policy4.1 Password
Creation4.1.1 All user-level and system-level passwords must
conform to the Password Construction Guidelines.4.1.2 Users
must use a separate, unique password for each of their work
related accounts. Users may not use any work related
passwords for their own, personal accounts.4.1.3 User accounts
that have system-level privileges granted through group
memberships or programs such as sudo must have a unique
password from all other accounts held by that user to access
system-level privileges. In addition, it is highly recomm...4.2
Password Change4.2.1 Passwords should be changed only when
there is reason to believe a password has been
compromised.4.2.2 Password cracking or guessing may be
performed on a periodic or random basis by the Infosec Team or
its delegates. If a password is guessed or cracked during one of
these scans, the user will be required to change it to be in
compliance with the...4.3 Password Protection4.3.1 Passwords
must not be shared with anyone, including supervisors and
coworkers. All passwords are to be treated as sensitive,
Confidential <Company Name> information. Corporate
Information Security recognizes that legacy applications do not
suppo...4.3.2 Passwords must not be inserted into email
messages, Alliance cases or other forms of electronic
communication, nor revealed over the phone to anyone.4.3.3
Passwords may be stored only in “password managers”
authorized by the organization.4.3.4 Do not use the "Remember
Password" feature of applications (for example, web
browsers).4.3.5 Any user suspecting that his/her password may
have been compromised must report the incident and change all
passwords.4.4 Application Development4.5 Multi-Factor
Authentication4.5.1 Multi-factor authentication is highly
encouraged and should be used whenever possible, not only for
work related accounts but personal accounts also.5. Policy
Compliance5.2 Exceptions5.3 Non-Compliance6 Related
Standards, Policies and Processes7 Revision History

More Related Content

Similar to SANS Institute 2014– All Rights Reserved Page 1 Consensu.docx

System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
aminpathan11
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
christinemaritza
 
Server Audit PolicyFree Use DisclaimerThis policy was created.docx
Server Audit PolicyFree Use DisclaimerThis policy was created.docxServer Audit PolicyFree Use DisclaimerThis policy was created.docx
Server Audit PolicyFree Use DisclaimerThis policy was created.docx
klinda1
 

Similar to SANS Institute 2014– All Rights Reserved Page 1 Consensu.docx (20)

Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
 
Explanation of the most common types of technical risks
Explanation of the most common types of technical risksExplanation of the most common types of technical risks
Explanation of the most common types of technical risks
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Get Ahead of your Next Security Breach
Get Ahead of your Next Security BreachGet Ahead of your Next Security Breach
Get Ahead of your Next Security Breach
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
Healthcare Compliance Software
Healthcare Compliance SoftwareHealthcare Compliance Software
Healthcare Compliance Software
 
Server Audit PolicyFree Use DisclaimerThis policy was created.docx
Server Audit PolicyFree Use DisclaimerThis policy was created.docxServer Audit PolicyFree Use DisclaimerThis policy was created.docx
Server Audit PolicyFree Use DisclaimerThis policy was created.docx
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
Password Management
Password ManagementPassword Management
Password Management
 
Sec440: Server Malware Protection Policy
Sec440: Server Malware Protection PolicySec440: Server Malware Protection Policy
Sec440: Server Malware Protection Policy
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
 

More from todd331

ScanScan 1Sc.docx
ScanScan 1Sc.docxScanScan 1Sc.docx
ScanScan 1Sc.docx
todd331
 
Scanned with CamScannerScanned with CamScannerIN.docx
Scanned with CamScannerScanned with CamScannerIN.docxScanned with CamScannerScanned with CamScannerIN.docx
Scanned with CamScannerScanned with CamScannerIN.docx
todd331
 
Scanned with CamScannerApplication Assignment 2 Part 2 .docx
Scanned with CamScannerApplication Assignment 2 Part 2 .docxScanned with CamScannerApplication Assignment 2 Part 2 .docx
Scanned with CamScannerApplication Assignment 2 Part 2 .docx
todd331
 
Scanned with CamScannerGlobal editionGloba.docx
Scanned with CamScannerGlobal editionGloba.docxScanned with CamScannerGlobal editionGloba.docx
Scanned with CamScannerGlobal editionGloba.docx
todd331
 
Scanned by CamScannerScanned by CamScannerChapte.docx
Scanned by CamScannerScanned by CamScannerChapte.docxScanned by CamScannerScanned by CamScannerChapte.docx
Scanned by CamScannerScanned by CamScannerChapte.docx
todd331
 
Scanned by CamScannerScanned by CamScannerTABLE .docx
Scanned by CamScannerScanned by CamScannerTABLE .docxScanned by CamScannerScanned by CamScannerTABLE .docx
Scanned by CamScannerScanned by CamScannerTABLE .docx
todd331
 
Sandro Reyes .docx
Sandro Reyes                                                      .docxSandro Reyes                                                      .docx
Sandro Reyes .docx
todd331
 
Scanned with CamScannerResearch Summary (paper)For thi.docx
Scanned with CamScannerResearch Summary (paper)For thi.docxScanned with CamScannerResearch Summary (paper)For thi.docx
Scanned with CamScannerResearch Summary (paper)For thi.docx
todd331
 
Scanned with CamScannerHACCP Recipe TermsCheck tempe.docx
Scanned with CamScannerHACCP Recipe TermsCheck tempe.docxScanned with CamScannerHACCP Recipe TermsCheck tempe.docx
Scanned with CamScannerHACCP Recipe TermsCheck tempe.docx
todd331
 
Scan by Easy Scanner© 2011 Natur.docx
Scan by Easy Scanner© 2011 Natur.docxScan by Easy Scanner© 2011 Natur.docx
Scan by Easy Scanner© 2011 Natur.docx
todd331
 
Scanned with CamScanner1 STANDARIZATION OF A B.docx
Scanned with CamScanner1 STANDARIZATION OF A B.docxScanned with CamScanner1 STANDARIZATION OF A B.docx
Scanned with CamScanner1 STANDARIZATION OF A B.docx
todd331
 
Scanlon Technologies, Inc. Anne Scanlon founded Scanlon Technol.docx
Scanlon Technologies, Inc. Anne Scanlon founded Scanlon Technol.docxScanlon Technologies, Inc. Anne Scanlon founded Scanlon Technol.docx
Scanlon Technologies, Inc. Anne Scanlon founded Scanlon Technol.docx
todd331
 
SBUX ISIncome Statement - As Reported 10K in millionsIncome Statem.docx
SBUX ISIncome Statement - As Reported 10K in millionsIncome Statem.docxSBUX ISIncome Statement - As Reported 10K in millionsIncome Statem.docx
SBUX ISIncome Statement - As Reported 10K in millionsIncome Statem.docx
todd331
 
Scale Ratio Variable Histograms are useful for presenting qu.docx
Scale Ratio Variable Histograms are useful for presenting qu.docxScale Ratio Variable Histograms are useful for presenting qu.docx
Scale Ratio Variable Histograms are useful for presenting qu.docx
todd331
 
Scan 12Scan 13Scan 14Scan 15Scan 16S.docx
Scan 12Scan 13Scan 14Scan 15Scan 16S.docxScan 12Scan 13Scan 14Scan 15Scan 16S.docx
Scan 12Scan 13Scan 14Scan 15Scan 16S.docx
todd331
 

More from todd331 (20)

ScanScan 1Sc.docx
ScanScan 1Sc.docxScanScan 1Sc.docx
ScanScan 1Sc.docx
 
Scapegoating is a theory of prejudice and discrimination. Societ.docx
Scapegoating is a theory of prejudice and discrimination. Societ.docxScapegoating is a theory of prejudice and discrimination. Societ.docx
Scapegoating is a theory of prejudice and discrimination. Societ.docx
 
Scanned with CamScannerScanned with CamScannerIN.docx
Scanned with CamScannerScanned with CamScannerIN.docxScanned with CamScannerScanned with CamScannerIN.docx
Scanned with CamScannerScanned with CamScannerIN.docx
 
Sara Mohammed1991 Washington St.Indiana, PA 15701(571) 550-3.docx
Sara Mohammed1991 Washington St.Indiana, PA 15701(571) 550-3.docxSara Mohammed1991 Washington St.Indiana, PA 15701(571) 550-3.docx
Sara Mohammed1991 Washington St.Indiana, PA 15701(571) 550-3.docx
 
Scanned with CamScannerApplication Assignment 2 Part 2 .docx
Scanned with CamScannerApplication Assignment 2 Part 2 .docxScanned with CamScannerApplication Assignment 2 Part 2 .docx
Scanned with CamScannerApplication Assignment 2 Part 2 .docx
 
Scanned with CamScannerGlobal editionGloba.docx
Scanned with CamScannerGlobal editionGloba.docxScanned with CamScannerGlobal editionGloba.docx
Scanned with CamScannerGlobal editionGloba.docx
 
Scanned by CamScannerScanned by CamScannerChapte.docx
Scanned by CamScannerScanned by CamScannerChapte.docxScanned by CamScannerScanned by CamScannerChapte.docx
Scanned by CamScannerScanned by CamScannerChapte.docx
 
SANS SIFT tool             Final project , related to (digital foren.docx
SANS SIFT tool             Final project , related to (digital foren.docxSANS SIFT tool             Final project , related to (digital foren.docx
SANS SIFT tool             Final project , related to (digital foren.docx
 
Scanned by CamScannerScanned by CamScannerTABLE .docx
Scanned by CamScannerScanned by CamScannerTABLE .docxScanned by CamScannerScanned by CamScannerTABLE .docx
Scanned by CamScannerScanned by CamScannerTABLE .docx
 
Sandro Reyes .docx
Sandro Reyes                                                      .docxSandro Reyes                                                      .docx
Sandro Reyes .docx
 
Scanned with CamScannerResearch Summary (paper)For thi.docx
Scanned with CamScannerResearch Summary (paper)For thi.docxScanned with CamScannerResearch Summary (paper)For thi.docx
Scanned with CamScannerResearch Summary (paper)For thi.docx
 
Scanned with CamScannerHACCP Recipe TermsCheck tempe.docx
Scanned with CamScannerHACCP Recipe TermsCheck tempe.docxScanned with CamScannerHACCP Recipe TermsCheck tempe.docx
Scanned with CamScannerHACCP Recipe TermsCheck tempe.docx
 
Scan by Easy Scanner© 2011 Natur.docx
Scan by Easy Scanner© 2011 Natur.docxScan by Easy Scanner© 2011 Natur.docx
Scan by Easy Scanner© 2011 Natur.docx
 
Scanned with CamScanner1 STANDARIZATION OF A B.docx
Scanned with CamScanner1 STANDARIZATION OF A B.docxScanned with CamScanner1 STANDARIZATION OF A B.docx
Scanned with CamScanner1 STANDARIZATION OF A B.docx
 
Scanlon Technologies, Inc. Anne Scanlon founded Scanlon Technol.docx
Scanlon Technologies, Inc. Anne Scanlon founded Scanlon Technol.docxScanlon Technologies, Inc. Anne Scanlon founded Scanlon Technol.docx
Scanlon Technologies, Inc. Anne Scanlon founded Scanlon Technol.docx
 
scan the following 2 poems by Robert Herrick. analyze each poems rhy.docx
scan the following 2 poems by Robert Herrick. analyze each poems rhy.docxscan the following 2 poems by Robert Herrick. analyze each poems rhy.docx
scan the following 2 poems by Robert Herrick. analyze each poems rhy.docx
 
SBUX ISIncome Statement - As Reported 10K in millionsIncome Statem.docx
SBUX ISIncome Statement - As Reported 10K in millionsIncome Statem.docxSBUX ISIncome Statement - As Reported 10K in millionsIncome Statem.docx
SBUX ISIncome Statement - As Reported 10K in millionsIncome Statem.docx
 
Scan the articles in the attached course text.  Write a discussi.docx
Scan the articles in the attached course text.  Write a discussi.docxScan the articles in the attached course text.  Write a discussi.docx
Scan the articles in the attached course text.  Write a discussi.docx
 
Scale Ratio Variable Histograms are useful for presenting qu.docx
Scale Ratio Variable Histograms are useful for presenting qu.docxScale Ratio Variable Histograms are useful for presenting qu.docx
Scale Ratio Variable Histograms are useful for presenting qu.docx
 
Scan 12Scan 13Scan 14Scan 15Scan 16S.docx
Scan 12Scan 13Scan 14Scan 15Scan 16S.docxScan 12Scan 13Scan 14Scan 15Scan 16S.docx
Scan 12Scan 13Scan 14Scan 15Scan 16S.docx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

SANS Institute 2014– All Rights Reserved Page 1 Consensu.docx

  • 1. SANS Institute 2014– All Rights Reserved Page 1 Consensus Policy Resource Community Password Protection Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is no prior approval required. If you would like to contribute a new policy or updated version of this policy, please send email to [email protected] Last Update Status: Updated October, 2017 1. Overview Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of our resources. All staff, including contractors and vendors with access to <Company Name> systems, are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.
  • 2. 2. Purpose The purpose of this policy is to establish a standard for creation of strong passwords and the protection of those passwords. 3. Scope The scope of this policy includes all personnel who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any <Company Name> facility, has access to the <Company Name> network, or stores any non- public <Company Name> information. 4. Policy 4.1 Password Creation 4.1.1 All user-level and system-level passwords must conform to the Password Construction Guidelines. 4.1.2 Users must use a separate, unique password for each of their work related accounts. Users may not use any work related passwords for their own, personal accounts. 4.1.3 User accounts that have system-level privileges granted
  • 3. through group memberships or programs such as sudo must have a unique password from all other accounts held by that user to access system-level privileges. In addition, it is highly recommend that some form of multi-factor authentication is used for any privileged accounts 4.2 Password Change 4.2.1 Passwords should be changed only when there is reason to believe a password has been compromised. 4.2.2 Password cracking or guessing may be performed on a periodic or random basis by the Infosec Team or its delegates. If a password is guessed or cracked during one of these mailto:[email protected] SANS Institute 2014– All Rights Reserved Page 2 Consensus Policy Resource Community scans, the user will be required to change it to be in compliance with the Password
  • 4. Construction Guidelines. 4.3 Password Protection 4.3.1 Passwords must not be shared with anyone, including supervisors and coworkers. All passwords are to be treated as sensitive, Confidential <Company Name> information. Corporate Information Security recognizes that legacy applications do not support proxy systems in place. Please refer to the technical reference for additional details. 4.3.2 Passwords must not be inserted into email messages, Alliance cases or other forms of electronic communication, nor revealed over the phone to anyone. 4.3.3 Passwords may be stored only in “password managers” authorized by the organization. 4.3.4 Do not use the "Remember Password" feature of applications (for example, web browsers). 4.3.5 Any user suspecting that his/her password may have been compromised must report the incident and change all passwords.
  • 5. 4.4 Application Development Application developers must ensure that their programs contain the following security precautions: 4.4.1 Applications must support authentication of individual users, not groups. 4.4.2 Applications must not store passwords in clear text or in any easily reversible form. 4.4.3 Applications must not transmit passwords in clear text over the network. 4.4.4 Applications must provide for some sort of role management, such that one user can take over the functions of another without having to know the other's password. 4.5 Multi-Factor Authentication 4.5.1 Multi-factor authentication is highly encouraged and should be used whenever possible, not only for work related accounts but personal accounts also. 5. Policy Compliance 5.1 Compliance Measurement
  • 6. SANS Institute 2014– All Rights Reserved Page 3 Consensus Policy Resource Community The Infosec team will verify compliance to this policy through various methods, including but not limited to, periodic walk-thrus, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner. 5.2 Exceptions Any exception to the policy must be approved by the Infosec Team in advance. 5.3 Non-Compliance An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. 6 Related Standards, Policies and Processes • Password Construction Guidelines 7 Revision History Date of Change Responsible Summary of Change June 2014 SANS Policy Team Updated and converted to new
  • 7. format. October, 2017 SANS Policy Team Updated to confirm with new NIST SP800-63.3 standards. 1. Overview2. Purpose3. Scope4. Policy4.1 Password Creation4.1.1 All user-level and system-level passwords must conform to the Password Construction Guidelines.4.1.2 Users must use a separate, unique password for each of their work related accounts. Users may not use any work related passwords for their own, personal accounts.4.1.3 User accounts that have system-level privileges granted through group memberships or programs such as sudo must have a unique password from all other accounts held by that user to access system-level privileges. In addition, it is highly recomm...4.2 Password Change4.2.1 Passwords should be changed only when there is reason to believe a password has been compromised.4.2.2 Password cracking or guessing may be performed on a periodic or random basis by the Infosec Team or its delegates. If a password is guessed or cracked during one of these scans, the user will be required to change it to be in compliance with the...4.3 Password Protection4.3.1 Passwords must not be shared with anyone, including supervisors and coworkers. All passwords are to be treated as sensitive, Confidential <Company Name> information. Corporate Information Security recognizes that legacy applications do not suppo...4.3.2 Passwords must not be inserted into email messages, Alliance cases or other forms of electronic communication, nor revealed over the phone to anyone.4.3.3 Passwords may be stored only in “password managers” authorized by the organization.4.3.4 Do not use the "Remember Password" feature of applications (for example, web browsers).4.3.5 Any user suspecting that his/her password may
  • 8. have been compromised must report the incident and change all passwords.4.4 Application Development4.5 Multi-Factor Authentication4.5.1 Multi-factor authentication is highly encouraged and should be used whenever possible, not only for work related accounts but personal accounts also.5. Policy Compliance5.2 Exceptions5.3 Non-Compliance6 Related Standards, Policies and Processes7 Revision History