Password Policy
Password Policy
Password Policy
Purpose
Passwords are an important component of information and network security. The use of a user id
and password combination serves to identify and authenticate a user to system resources and
information assets. It is only through authenticated access that the enterprise can be assured that
systems and data are being used appropriately. As such, passwords must be constructed, used
and protected appropriately to ensure that the level of security they imply is actually met.
The purpose of this policy is to provide the guidelines necessary for all of the employees of [the
company] to create appropriate passwords and to use them and protect them in an appropriate
manner.
Scope
This policy applies to all employees of [the company] who have any form of computer or
application account that requires password access. Examples of accounts include:
• Workstation (desktop/laptop)
• Network
• E-mail system
• Accounting application
• Customer information database
Please note: This list is not intended to be all-inclusive; it is simply provided for reference
purposes.
Policy
General
1. Password construction, lifecycle and re-use parameters will be variable according to the
classification of the system or data that they are intended to protect.
3. Users will be notified one week in advance of password expiration. At that point, and at
every subsequent login until a change is made, users will be prompted to select a new
password.
Page 1
2. Passwords used to access data classified as “Confidential” or the systems that host this
data must be a minimum of eight (8) characters is length. Further, these passwords must
use at least one character of three of the four character types, those being lower case
letters, upper case letters, numbers and special characters.
3. Passwords used to access data classified as “Private” or the systems that host this data
must be a minimum of six (6) characters in length. Further, these passwords must use at
least one character of two of the four character types, those being lower case letters,
upper case letters, numbers and special characters.
4. Passwords are not needed to access data classified as “Public” or the systems that host
this data, as long as these systems do not host data of a higher classification level and so
no construction guidelines need to be set.
2. Passwords used to access data classified as “Confidential” or the systems that host this
data will have a maximum age of three (3) months and a minimum age of two (2) weeks.
As such, passwords must be changed every three (3) months and cannot be changed
more frequently than every two (2) weeks. Where the application or system can only be
specified to change on the basis of a variable number of days, maximum age will be set
at ninety (90) days and minimum age at fourteen (14) days.
3. Passwords used to access data classified as “Private” or the systems that host this data
will have a maximum age of six (6) months and a minimum age of one (1) week. As such,
passwords must be changed every six (6) months and cannot be changed more
frequently than every one (1) week. Where the application or system can only be
specified to change on the basis of a variable number of days, maximum age will be set
at one hundred and eighty (180) days and minimum age at seven (7) days.
4. Passwords are not needed to access data classified as “Public” or the systems that host
this data, as long as these systems do not host data of a higher classification level and so
no lifecycle guidelines need to be set.
Page 2
2. Passwords used to access data classified as “Confidential” or the systems that host this
data may be reused every sixth password. As such a completely new password is
required for the first five expiries; thereafter the first password can be reused.
“Completely new” is defined as having at least fifty percent (50%) of the characters
different from the previous password.
3. Passwords used to access data classified as “Private” or the systems that host this data
may be reused every third password. As such a completely new password is required for
the first two expiries; thereafter the first password can be reused. “Completely new” is
defined as having at least fifty percent (50%) of the characters different from the previous
password.
4. Passwords are not needed to access data classified as “Public” or the systems that host
this data, as long as these systems do not host data of a higher classification level and so
no reuse guidelines need to be set.
2. Under no circumstances will any member of the organization request a password without
the request coming from both a representative of the IT department and the user’s direct
manager. Should a request be made that does not conform to this standard, immediately
inform both the IT department and your direct manager.
3. Passwords are not to be transmitted electronically over the unprotected Internet, such as
via e-mail. However, passwords may be used to gain remote access to company
resources via the company’s Virtual Private Network or SSL-protected Web site.
6. Passwords used to gain access to company systems are not to be used as passwords to
access non-company accounts or information. Similarly, passwords used to access
personal, non-work related accounts are not to be used to access company accounts.
Page 3
8. If an employee either knows or suspects that his/her password has been compromised, it
must be reported to the IT Department and the password changed immediately. If the
minimum aging requirement has not been met for the password, the IT department will
reset the minimum aging for the account allowing the user to create a new password.
9. The IT Department may attempt to crack or guess users’ passwords as part of its
ongoing security vulnerability auditing process. If a password is cracked or guessed
during one of these audits, the user will be required to change his or her password
immediately.
Enforcement
Any employee who is found to have violated this policy may be subject to disciplinary action, up
to an including termination of employment.
_____________________________________________________
Info-Tech Research Group Templates and Policies are provided for the free and unrestricted use
of subscribers to Info-Tech Research Group services. You can use this document either in whole,
in part, or as a basis and guide for your own documents. To customize this document with your
own corporate marks and titles, simply replace the Info-Tech Information in the Header and
Footer fields of this document.
Page 4