Password Management: 1 Objective
Password Management: 1 Objective
Password Management
1 OBJECTIVE
The main objective of this policy is to establish a standard of creation of strong passwords, protection of
those passwords and maintain a systematic/frequency of change of password
2 SCOPE
This scope of this policy will involve all personnel who have their user account created in Goldstone
Technologies resources systems like servers, networks, desktops, applications etc including customer
resources systems.
3 APPLICABILITY
This policy is applicable for the all the systems (Servers i.e.) OS, Network components and applications) and
users of Goldstone.
4 DETAILED POLICY
4.1 General
All LIVE/Production systems level passwords both at system (OS), Network components and
application systems level must follow the global Password Management policy guidelines.
All system level passwords ex.) Root, Administrator, enable password, any default user accounts
(OS, Databases, and Network devices) must be changed once in 30 – 45 days.
All Administrator level passwords shall be stored in Fireproof safe cabinet.
If any user account is created which is equivalent to Administrator account, the password
should be different from that of administrator user account.
Passwords must not be communicated through mail or any form of electronic communication
like SMS etc and/or written in notebook, paper etc.
All users including administrator users must not use the same or similar passwords which are
used in public systems like yahoo, Google, etc.
Page 1
-------------------------------------------------------------------------------------------------
Users will be authenticated by individual user name then password and not by groups.
Password guidelines must be followed for ensuring strong passwords are used in GTL.
Ensure that passwords have numeric numbers, special characters ex.) !@#$%^&
5 EXCEPTIONS
6 COMPLIANCE
Violations of this policy or any other GTL policy or regulation may be subject to revocation or
limitation of computer and network privileges, as well as, other disciplinary actions that may be referred to
the disciplinary committee and appropriate external law enforcement authorities, as applicable
Page 2
-------------------------------------------------------------------------------------------------
7 ROLES &RESPONSIBILITIES
Role Responsibility
Monitoring
User Guidelines
Page 3