Sysadmin Magazine April 2023
Sysadmin Magazine April 2023
Sysadmin Magazine April 2023
Secure Password
Management:
Best Practices
Contents SysAdmin Magazine April 2023
SysAdmin
Magazine Contents
74
3 Tips for Better Password Management
№ April ‘23
2
Contents SysAdmin Magazine April 2023
Password
proper tools, you can make it more difficult for hackers to sent to the user’s phone, in addition to a password.
gain access to your sensitive information and systems.
▪ It’s important for users to avoid using a single
Management
password for multiple accounts and sites. If a hacker
gains access to a username and password combination,
then they will often try to reuse those digital credentials
Joe Dibley
What should be considered against different services to further their access.
Security Researcher at Netwrix in a good password ▪ Change your passwords if you suspect a breach.
While it is no longer recommended to force users to
change their password frequently, changing passwords
Even as more advanced forms of authentication, such as
that might have been compromised reduces the risk
biometrics, are developed and implemented, passwords ▪ Create and enforce a policy requiring the use of
of accounts being taken over by someone who has
continue to be a commonly used form of authentication. strong passwords. According to latest NIST best
obtained the current passwords.
This is partly due to the fact that they are relatively simple practices, password length contributes to far more to
to implement and require little infrastructure to support. password security than complexity, so there is no need
▪ Educate users. To protect your data and maintain the
However, the fact that they are so widely used also means to require a combination of uppercase and lowercase
integrity of systems and services, it’s important for users
that they are a common target for hackers, which is why it’s letters, numbers, and special characters for passwords;
to be regularly trained on managing their passwords
so important to use strong, unique passwords and manage in fact, a short password, even a complex one, will take
and on how to spot and respond to phishing and other
them properly. a hacker less time to crack than a long one with less
attack techniques.
complexity, and it will harder for the user to remember.
However, it’s hard for people to remember many strong It is still recommended to avoid using easily guessable
▪ Avoid accessing sensitive information or other IT
passwords, so they often write them down or store them information and to test new passwords against a
resources on public networks. Using a virtual
in unsecured locations, which is a huge security risk. dictionary of compromised passwords.
private network (VPN) can also help encrypt your
Accordingly, it’s important to educate all users about best
internet connection and protect your data from being
practices for password management. ▪ Implementing two-factor authentication (2FA) or
intercepted by hackers.
3
Contents SysAdmin Magazine April 2023
▪ It’s also important to keep your software and devices a solution that is easy to use and provides good protection. ▪ Backup and recovery. The password manager should
updated and patched to ensure that you have the Ultimately, the best password management solution for include a way to back up and restore your password
latest security features and that known vulnerabilities, you will depend on your specific needs and preferences, data in case of data loss.
especially those that are being actively exploited, are so it’s better to evaluate several and choose the one that
promptly mitigated. best meets your requirements. Here are the key criteria to ▪ Secure sharing options. The solution should provide
evaluate: secure options for sharing passwords with team (or
▪ Consider investing in a good password management ▪ Security. The most important consideration when family) members, if necessary.
solution. These tools provide an easy way to create, assessing a password management solution is security.
store and manage passwords and other sensitive It should use strong encryption to protect your password ▪ Reporting and analytics. This feature can be beneficial
information, and some can even integrate with browsers data and should have been independently audited for in providing insight into how passwords are being
and other systems for added convenience. This enables security vulnerabilities. Also research whether (and used, including who’s accessing them and when, and
your users to use strong, unique passwords for each of how often) the vendor has been breached and how it for detecting and alerting you about potential security
their accounts without having to remember them all. responded. breaches.
Choosing an effective ▪ Auto-fill during login. This feature saves time and
effort by automatically filling in your credentials on
▪ Regular updates. It’s important to choose a solution
4
Contents SysAdmin Magazine April 2023
Password Policy
compliance with many standards and regulations. Netwrix
Password Secure is an enterprise password management
solution that enables you to eliminate weak passwords,
implement password policies for specific teams and pass
compliance audits more easily — all while simplifying
Best Practices for
password management for both business users and IT
teams. Users can even securely share passwords, keys,
Strong Security in
profiles and other secrets with their teammates.
AD
Free Download
5
Contents SysAdmin Magazine April 2023
lines around issues such as password strength. Special ▪ Machine-generated passwords should be at least 6
Guidelines
handle passwords during authentication and other pro- characters in length.
cesses. ▪ All ASCII/Unicode characters should be allowed, including
emojis and spaces.
Not all organizations must adhere to NIST guidelines. ▪ Stored passwords should be hashed and salted, and
However, many follow NIST password policy never truncated.
Joe Dibley
Security Researcher at Netwrix recommendations even if it’s not required because they ▪ Prospective passwords should be compared against
provide a good foundation for sound digital identity password breach databases and rejected if there’s a
management. Indeed, strong password security helps match.
companies block many cybersecurity attacks, including ▪ Passwords should not expire.
hackers, brute force attacks like credential stuffing and ▪ Users should be prevented from using sequential
6
Contents SysAdmin Magazine April 2023
You probably notice that some of these recommendations it’s recommended to allow passwords to be at least 64 disallow passwords in lists from breaches (such as the Have
represent a departure from previous assumptions and characters as a maximum length. I Been Pwned? database, which contains 570+ million pass-
standards. For example, NIST has removed complexity words from breaches), previously used passwords, well-
requirements like special characters in passwords; this Verifiers should no longer truncate any passwords during known commonly used passwords, and context-specific
change was made in part because users find ways to processing. Passwords should be hashed and salted, with passwords (e.g., the name of the service).
circumvent stringent complexity requirements. Instead of the full password hash stored.
struggling to remember complex passwords and risking When a user attempts to use a password that fails this
getting locked out, they may write their passwords down Also the recommended NIST account lockout policy is to check, a message should be displayed asking them for a
and leave them near physical computers or servers. Or they allow users at least 10 attempts at entering their password different password and providing an explanation for why
simply recycle old passwords based on dictionary words by before being locked out. their previous entry was rejected.
making minimal changes during password creation, such as
incrementing a number at the end.
Accepted characters
Reduced complexity & password
All ASCII characters, including the space character, should expiration
be supported in passwords. NIST specifies that Unicode
NIST Guidelines characters, such as emojis, should be accepted as well. As explained earlier in the blog, previous password
complexity requirements have led to less secure human
Users should be prevented from using sequential characters behavior, instead of the intended effect of tightening security.
Now let’s explore the NIST guidelines in more detail. With that in mind, NIST recommends reduced complexity
(e.g., “1234”), repeated characters (e.g., “aaaa”) and simple
dictionary words. requirements, which includes removing requirements for
special characters, numbers, uppercase characters, etc.
Password length & processing
Length has long been considered a crucial factor for A related recommendation for reducing insecure human
7
Contents SysAdmin Magazine April 2023
Kickstart Guide
strong yet flexible password policies that enhance security
and compliance without hurting user productivity or
NIST also recommends not using knowledge-based
burdening helpdesk and IT teams.
authentication (KBA), such as questions like “What was the
name of your first pet?”
Netwrix Password Reset enables users to safely unlock their
to Implementing
own accounts and reset or change their own passwords,
right from their web browser. This self-service functionality
the NIST
Password managers & two-factor dramatically reduces user frustration and productivity
losses while slashing helpdesk call volume.
Cybersecurity
authentication (2FA)
To account for the growing popularity of password
managers, users should be able to paste passwords.
Free Download
SMS is no longer considered a secure option for 2FA. Instead,
one-time code provider, such as Google Authenticator or
Okta Verify, should be used.
8
Contents SysAdmin Magazine April 2023
Finding Weak
but are easy to remember. These weak passwords leave the
organization vulnerable to one of the simplest attacks that Step 1. Check the Active Directory
adversaries use to gain a foothold in a network: guessing. password policy and lockout policy
Passwords in You might be surprised at just how well this strategy works. To avoid lockouts, attackers need to know how many
Active Directory
Let’s walk through an example of a password guessing attack, bad passwords they can guess per account. And to pick
and then explore how you can assess your vulnerability and passwords that are likely to work, they need to know the
strengthen your cybersecurity. company’s AD password policy. CrackMapExec gives them
both. Here is an example of the output it provides:
Jeff Warren
Security Expert, SVP of Products at Netwrix
9
Contents SysAdmin Magazine April 2023
This command will try each password against each account until it finds a match:
10
Contents SysAdmin Magazine April 2023
11
Contents SysAdmin Magazine April 2023
Hello for
something they know (a PIN) or something they are (bio-
word and then access both an on-premises resource (a
metrics). This approach is clearly far more secure than us-
file share) and a cloud resource (SharePoint Online) with-
ing passwords. With WHfB in place, in order to steal a us-
Business
out being prompted to enter a password. Accordingly, my
er’s identity, an adversary would have to obtain that user’s
lab consisted of:
laptop or phone. In contrast, a hacker has a number of far
easier paths for stealing traditional user passwords, such ▪ An on-premises domain controller and a file server run-
as extracting the Ntds.dit file from any domain controller. ning Windows Server 2016 and a member workstation
running Windows 10, all joined to the same AD domain
Jeff Warren But how well does Windows Hello for Business actually ▪ An Azure AD domain with Azure AD Premium licenses
Security Expert, SVP of Products at Netwrix
work? To find out, I set up a lab in my hybrid AD envi- ▪ Azure AD Connect synchronizing users and hashes; no
ronment and put WHfB through its paces. This article ex- AD Federation Services
plains what I did — and the five key conclusions I was able ▪ Azure AD-joined devices through Intune with the Edge
Passwords are everywhere — and nobody likes them.
to draw about its benefits and limitations. browser
For users, they are a pain to remember and manage. For
businesses, they continue to be a primary source of data
breaches, both on premises and in the cloud. In fact, the
Step 2. Deploy Windows Hello for
2022 Verizon DBIR reports that credential theft was in-
volved in nearly half of all cyberattacks, including third-par- Business
ty breaches, phishing attacks and basic web application at-
tacks. Windows Hello for Business offers multiple deployment
models. The best option for you will depend on multiple
12
Contents SysAdmin Magazine April 2023
13
Contents SysAdmin Magazine April 2023
#2. A lot depends on your needs #4. Lateral movement is still a thing
The value of Windows Hello for Business depends on the Windows Hello for Business does not eliminate pass-the-
specifics of your environment. It worked great in my lab hash, pass-the-ticket and other lateral movement attacks,
for connecting to Microsoft 365 and network file shares nor does it block Golden Tickets and other privilege
without any password prompt. If you have custom web escalation techniques. Since those tactics take advantage of
apps and lots of cloud apps, start by getting them into Azure non-interactive logons, they are outside the scope of WHfB. HOW TO
SSO; that’s outside the scope of this research but it seems
to have broad coverage and a web application proxy for
custom on-prem web apps. #5. Passwordless is a great way
to go. Get there as soon as you
Find Last
#3. Password attacks are still a thing
reasonably can Password Change
Since WHfB does not eliminate passwords, it does not
I definitely recommend evaluating WHfB if you are
using Azure and already own licenses for the necessary
Date
eliminate your risk from password-based attacks like
components. It makes signing in easy, and you can improve
password spraying. Therefore, you still need a good
your password security measures without user friction. In Learn More
password security strategy for both human and non-human
addition, users will start to find it weird when they are asked
accounts. Netwrix Password Policy Enforcer can help by
to enter their password, which will make them less likely to
enabling you to:
expose their credentials in attacks such as phishing scams.
14
Contents SysAdmin Magazine April 2023
3. Open Event viewer and search Security log for event id’s:
628/4724 – password reset attempt by administrator and
627/4723 – password change attempt by user.
15
Contents SysAdmin Magazine April 2023
ц
FRUSTRATE HACKERS, SATISFY AUDITORS AND DELIGHT USERS WITH PASSWORD POLICY ENFORCER
TOOL OF THE MONTH ▪ Choose among dozens of strong, detailed password ▪ Empower IT admins to easily enforce multiple
policies, both on remises and in the cloud. password policies. Reduce user frustration by helping
users choose compliant new passwords.
Netwrix
Password Policy
Enforcer ▪ Use out-of-the-box policy templates based on CIS,
HIPAA, NERC CIP, NIST and PCI DSS.
16
Contents SysAdmin Magazine April 2023
[On-Demand Webinar]
Why Weak Passwords Join Brian Johnson (CISSP, OSCP and president of 7 Minute Security) to find out how weak the
passwords are in your organization, and what you can do to strengthen this part of your security
▪ How you can manually audit your environment for weak and common passwords
▪ “Hidden” places on the network (like AD, Group Policy objects and file shares) where
passwords often live unbeknownst to sysadmins — but not hackers!
Brian Johnson
Security enthusiast/Podcaster ▪ How you can enforce granular password policies to reduce your risk from password attacks
Martin Cannard
VP of Product Strategy
Watch Now
17
About Netwrix
What did you think
Netwrix is a software company that enables information security and governance professionals to reclaim control over
of this issue? sensitive, regulated and business-critical data, regardless of where it resides.
Over 11500 organizations worldwide rely on Netwrix solutions to secure sensitive data, realize the full business value of
enterprise content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and
knowledge workers.
300 Spectrum Center Drive 1-949-407-5125 Spain: +34 911 982608 Switzerland: +41 43 508 3472 Hong Kong: +852 5808 1306
Suite 200 Irvine, CA 92618 Toll-free (USA): 888-638-9749 Italy: +39 02 947 53539
Netherlands: +31 858 887 804 France: +33 9 75 18 11 19
5 New Street Square +44 (0) 203 588 3023 SOCIAL: netwrix.com/social
London EC4A 3TW