0% found this document useful (0 votes)
50 views3 pages

Password Protection Policy

This document outlines a password protection policy for an organization. It provides guidance on password creation, change requirements, protection, and multi-factor authentication. The policy aims to establish secure standards for password use and protection across all systems and accounts to prevent unauthorized access to sensitive data. Compliance is measured by audits and exceptions require approval from the Infosec team. Violations may result in disciplinary action up to termination.

Uploaded by

norsyaliza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views3 pages

Password Protection Policy

This document outlines a password protection policy for an organization. It provides guidance on password creation, change requirements, protection, and multi-factor authentication. The policy aims to establish secure standards for password use and protection across all systems and accounts to prevent unauthorized access to sensitive data. Compliance is measured by audits and exceptions require approval from the Infosec team. Violations may result in disciplinary action up to termination.

Uploaded by

norsyaliza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Password Protection Policy

Last Update Status: Updated October 2022

Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for
your organization. There is no prior approval required. If you would like to contribute a new policy or updated version of this policy, please send email to
[email protected].

1. Overview
Passwords are a critical aspect of computer security. A weak or compromised
password can result in unauthorized access to our most sensitive data and/or
exploitation of our resources. All staff, including contractors and vendors with
access to <Company Name> systems, are responsible for taking the appropriate
steps, as outlined below, to select and secure their passwords.

2. Purpose
The purpose of this policy is to establish a standard for the secure use and protection of all
work related passwords.

3. Scope
The scope of this policy includes all personnel who have or are responsible for an account
(or any form of access that supports or requires a password) on any system that resides at
any <Company Name> facility, has access to the <Company Name> network, or stores any
non-public <Company Name> information.

4. Policy

4.1 Password Creation and Use


4.1.1 All user-level and system-level passwords must conform to the Password
Construction Guidelines.
4.1.2 Users must use a separate, unique password for each of their work related
accounts. Users may not use any work related passwords for their own,
personal accounts.
4.1.3 Staff are allowed to use authorized, approved password managers to
securely store and manage all their work related passwords.
4.1.4 User accounts that have system-level privileges granted through group
memberships or programs such as sudo must have a unique password from all
other accounts held by that user to access system-level privileges. In addition, it
is highly recommended that some form of multi-factor authentication is used for
any privileged accounts

CONSENSUS POLICY RESOURCE COMMUNITY


© 2022 SANS™ Institute
4.2 Password Change
4.2.1 Passwords should be changed only when there is reason to believe a
password has been compromised or fails to meet our Password Creation
Requirements.. We do not recommend the use or setting of regular
password expiration.

4.3 Password Protection


4.3.1 Passwords must not be shared with anyone, including supervisors and
coworkers. All passwords are to be treated as sensitive, Confidential
<Company Name> information. Corporate Information Security
recognizes that legacy applications do not support proxy systems in
place. Please refer to the technical reference for additional details.
4.3.2 Passwords must not be inserted into email messages or other forms of
electronic communication, nor revealed over the phone to anyone.
4.3.3 Passwords may be stored only in password managers authorized by the
organization.
4.3.4 Do not use the "Remember Password" feature of applications (for
example, web browsers).
4.3.5 Any individual suspecting that their password may have been
compromised must report the incident and change all relevants
passwords.

4.4 Application Development


Application developers must ensure that their programs contain the following
security precautions:
4.4.1 Applications must support authentication of individual users, not groups.
4.4.2 Applications must not store passwords in clear text or in any easily
reversible form.
4.4.3 Applications must not transmit passwords in clear text over the network.
4.4.4 Applications must provide for some sort of role management, such that
one user can take over the functions of another without having to know
the other's password.

4.5 Multi-Factor Authentication


4.5.1 Multi-factor authentication is highly encouraged and should be used whenever
possible, not only for work related accounts but personal accounts also

5. Policy Compliance

5.1 Compliance Measurement

CONSENSUS POLICY RESOURCE COMMUNITY


© 2022 SANS™ Institute
The Infosec team will verify compliance to this policy through various methods,
including but not limited to, business tool reports, internal and external audits, and
feedback to the policy owner.
5.2 Exceptions
Any exception to the policy must be approved by the Infosec team in advance.
5.3 Non-Compliance
An employee found to have violated this policy may be subject to disciplinary action, up
to and including termination of employment.

6. Related Standards, Policies and Processes


• Password Construction Guidelines

7. Revision History

Date of Change Responsible Summary of Change

June 2014 SANS Policy Updated and converted to new format.


Team

October, 2017 SANS Policy Updated to confirm with new NIST SP800-
Team 63.3 standards.

October 2022 SANS Policy Updated and converted to new format.


Team

CONSENSUS POLICY RESOURCE COMMUNITY


© 2022 SANS™ Institute

You might also like