0% found this document useful (0 votes)
182 views7 pages

Proposed Password Security Policy

The document proposes a password policy for Sissala Rural Bank Limited that defines password requirements including minimum length, complexity, expiration, lockout limits, and storage. It aims to establish secure password practices to protect access to the bank's ICT resources and systems.

Uploaded by

Charles Subie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
182 views7 pages

Proposed Password Security Policy

The document proposes a password policy for Sissala Rural Bank Limited that defines password requirements including minimum length, complexity, expiration, lockout limits, and storage. It aims to establish secure password practices to protect access to the bank's ICT resources and systems.

Uploaded by

Charles Subie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

SISSALA RURAL BANK LIMITED

ICT DEPARTMENT

PROPOSED PASSWORD POLICY

By: Systems Administrator


(CHARLES SUBIE)
1
Table of Contents
Introduction .................................................................................................................................... 3
Scope ............................................................................................................................................... 3
Ownership & Implementation ........................................................................................................ 3
Password Requirements ................................................................................................................. 3
Minimum Password Length......................................................................................................... 3
Passwords Must Not Be Reused.................................................................................................. 4
Password Expiration .................................................................................................................... 4
Consecutive Unsuccessful Login Attempts ................................................................................. 4
Difficult-To-Guess Passwords ...................................................................................................... 4
Cyclical Passwords ....................................................................................................................... 4
System-Generated Passwords ..................................................... Error! Bookmark not defined.
Storage of System-Generated Passwords ................................................................................... 4
Assignment of Expired Passwords .............................................................................................. 5
Password-Based Boot Protection ................................................................................................ 5
Display and Printing of Passwords .............................................................................................. 5
Protection of Passwords Sent Through the Mail ........................................................................ 5
Encryption of Passwords ............................................................................................................. 5
Prevention of Password Retrieval ............................................................................................... 5
Incorporation of Passwords into Software ................................................................................. 6
System Access Control with Individualized Passwords ................ Error! Bookmark not defined.
Passwords for each internal/external Network Device .............................................................. 6
Changing Vendor Default Passwords .......................................................................................... 6
Suspected Disclosure Forces Password Changes ........................................................................ 6
Password Sharing Prohibition ..................................................................................................... 6
Password for personal use only .................................................................................................. 6
Disclosure of incorrect log-in information .................................................................................. 6
Password Reset ............................................................................................................................... 7
Document Change Management .................................................................................................... 7

2
Introduction
This Policy has been compiled to define the base level Password requirements
for use within Sissala Rural Bank Ltd. The policy demonstrates Sissala I.T
department’s commitment to information security and its proactive approach for
addressing risks within the bank.
One of the vital components for an organization to operate a secure and
controlled information systems environment is the deployment of approved
security mechanisms that support its security services (identification and
authentication, access control, data integrity and confidentiality). One of the key
mechanisms is the definition and implementation of a uniform Password Policy
throughout the organization.

Scope
The Password Policy applies to all accounts used to access the bank’s ICT
resources.
The Password Requirements defined in this document apply to all computer
system and software used for our day to day operation (I-TRANS, T24, Western
Union, Windows Operating System etc. Where systems do not have the facilities
to cater for the Password Requirements then the ICT department would exempt
such a system from the policy.

Ownership & Implementation


Whereas this Password Policy document is owned by the Bank, it will be
maintained by the Systems Administrator and Management.
The custodians of individual systems, servers, workstations, desktops and other
devices are responsible for the enforcement of the Password Policy.

Password Requirements
Minimum Password Length
The length of passwords must always be checked automatically at the time that
users construct or select them. All passwords must have at least eight (8)
characters.

Password Complexity
The password should contain a minimum of one (1) non-alphabetic character
and should not contain more than two (2) consecutive repeated characters.

3
Passwords Must Not Be Reused
Users must not construct passwords, which are identical or substantially similar
to passwords that they had previously employed. On all multi-user machines,
system software or locally developed software must be used to maintain an
encrypted history of previous fixed passwords.

Password Expiration
Password expiration should be enforced on all accounts. The expiration period
for user passwords should be set to 45 days, after which the user should be
forced to change the password before any other work can be performed.

Consecutive Unsuccessful Login Attempts


To prevent password guessing attacks, the number of consecutive attempts to
enter an incorrect password must be strictly limited. After three (3)
unsuccessful login attempts, the account must be locked for at least one hour or
until it is reset by a system administrator.

Difficult-To-Guess Passwords
All user-chosen passwords for computers and networks must be difficult to
guess. Words in a dictionary, derivatives of user-IDs, and common character
sequences such as "123456" must not be employed. Likewise, personal details
such as spouse's name, vehicle license plate, social security number and
birthday must not be used unless accompanied by additional unrelated
characters. User-chosen passwords must also not be any part of speech. For
example, proper names, geographical locations, common acronyms and jargon
must not be employed.

Cyclical Passwords
Users are prohibited from constructing fixed passwords by combining a set of
characters that do not change, with a set of characters that predictably change.
In these prohibited passwords, characters that change are typically based on
the month, a department, a project, or some other easily-guessed factor. For
example, users must not employ passwords like "X34JAN" in January, "X34FEB"
in February, etc.

Storage of System-Generated Passwords


If passwords or Personal Identification Numbers (PINs) are generated by a
computer system, they must always be issued immediately after they are
generated. Regardless of the form they take, un-issued passwords and PINs
must never be stored on the involved computer systems.

4
Assignment of Expired Passwords
The initial passwords issued by a security administrator must be valid only for
the involved user's first on-line session. At that time, the user must be forced to
choose another password before any other work can be performed.

Password-Based Boot Protection


All workstations, no matter where they are located, must use an access control
system approved by the IT department. In most cases, this will involve screen-
savers with fixed-password-based boot protection along with a time-out-after-
no-activity feature.

Display and Printing of Passwords


The display and printing of passwords should be masked, suppressed, or
otherwise covered so that unauthorized parties will not be able to observe or
subsequently recover them. This includes, and is not limited to, passwords
written on a piece of paper, where the paper might or might not be stored in a
secure (under the keyboard, inside a drawer, in purse or wallet, etc.) location.

Protection of Passwords Sent Through the Mail


If sent by regular mail, e-mail or similar physical distribution systems,
passwords must be sent separately from user-IDs. These mailings must have no
markings indicating the nature of the enclosure. Passwords must also be
concealed inside an opaque envelope that will readily reveal tampering.

Encryption of Passwords
Passwords must always be encrypted (non-clear text) when held in storage for
any period of time (backup media, batch files, automatic log-in scripts, software
macros, etc.) or when transmitted over networks. This will prevent them from
being disclosed to wire-tapers, technical staff who are reading systems logs,
and other unauthorized parties. Passwords assigned by an administrator for a
particular account (initial account creation, or password resets for existing
accounts) and systems used for account management are excluded from this
specific requirement.

Prevention of Password Retrieval


Computer and communication systems must be designed, tested, and controlled
so as to prevent both the retrieval of, and unauthorized use of stored
passwords, whether the passwords appear in encrypted or unencrypted form.

5
Incorporation of Passwords into Software
To allow passwords to be changed when needed, passwords should not be
hand-coded (incorporated) into software developed or modified by SISSALA
RURAL BANK LIMITED employees or third parties.

Passwords for each internal/external Network Device


All SISSALA RURAL BANK LIMITED network devices (routers, firewalls, access
control servers, etc.) should have passwords or other access control
mechanisms. A compromise in the security of one device, will therefore not
automatically lead to a compromise in other devices.

Changing Vendor Default Passwords


All vendor-supplied default passwords must be changed before any computer or
communications system is used for the bank operations.

Suspected Disclosure Forces Password Changes


All passwords must be promptly changed if they are suspected of being
disclosed, or known to have been disclosed to unauthorized parties

Password Sharing Prohibition


Regardless of the circumstances, passwords must never be shared or revealed
to anyone else besides the authorized user. To do so exposes the authorized
user to responsibility for the actions that the other party takes with the
password. If users need to share computer resident data, they should use
electronic mail, public directories on local area network servers, or other
mechanisms.

Password for personal use only


Users are responsible for all activity performed with their personal user-IDs.
User-IDs may not be utilized by anyone but the individuals to whom they have
been issued.
Users must not allow others to perform any activity with their user-IDs.
Similarly, users are forbidden from performing any activity with IDs belonging
to other users (exception anonymous user-IDs like "guest").

Disclosure of incorrect log-in information


When logging into a computer, if any part of the log-in sequence is incorrect,
the user must not be given specific feedback indicating the source of the
problem. Instead, the user must simply be informed that the entire login
process was incorrect.

6
Password Reset
Users who wish to reset their password should fill a password reset form and
submit to their supervisor for endorsement.
Supervisors would then call the ICT department for the password to be reset.
The supervisor should call the funds transfer manager/manageress for I-trans
account password to be reset.

Document Change Management


The ICT department believes that it is important to keep this Password Policy
current in order to ensure that it addresses security issues accurately and is up-
to-date with evolving business issues and technologies. This policy is a living
document that will be reviewed annually and/or updated as needed.
The System Administrator will draft necessary changes and have them reviewed
and approved by the board of Directors and Management as appropriate.
Anyone in the Bank can determine the need for a modification to the existing
policy. Recommendations for changes to this policy should be communicated to
the ICT department.

You might also like