PASSWORD SECURITY POLICY Table of Contents PASSWORD SECURITY POLICY: SAMPLE 1 .........................................................................................................2 PASSWORD SECURITY POLICY: SAMPLE 2 .........................................................................................................4 PASSWORD SECURITY POLICY: SAMPLE 3 .........................................................................................................8 1 Source: www.knowledgeleader.com PASSWORD SECURITY POLICY: SAMPLE 1 Prepared By: Approved By: Revision Date: Effective Date: The following sample outlines a policy for ensuring secure use of network passwords. This policy guides initial password setup, complexity, sharing, storage and many other topics. FORCED CHANGE OF INITIAL PASSWORD Users must change all system-generated passwords upon first login with that password. This applies both to passwords that are attached to a new user account and passwords that have been reset by an administrator. The system will require and prompt for changes upon first login. DIFFICULT-TO-GUESS PASSWORDS REQUIRED Users are required to choose passwords that are difficult to guess. Password must not be easily deducible words or characters such as the user’s first or last name, spouse’s name, name of a pet, a sequence of numerals or letters, or any word found in a standard English dictionary. PASSWORDS MUST NEVER BE WRITTEN DOWN Users must not write down or otherwise record their passwords in readable form near the system to which the password pertains. For example, a user must not write his/her network password on a note and tape it to his/her computer. Passwords must also not be written down and left in a place where others might discover them. If a password must be written down, it must be secured and far away from the system to which it pertains. In general, users must choose passwords that are challenging for others to guess but easy for them to remember, so users do not feel compelled to write down a password in order to remember it. PASSWORD SHARING PROHIBITION Passwords secure an individual account on the system. Each account must be used only by the individual formally assigned to that account. Therefore, passwords must not be exchanged or shared. 2 Source: www.knowledgeleader.com DISPLAY AND PRINTING OF PASSWORDS The display and printing of passwords must be masked, suppressed or otherwise obscured so that unauthorized parties will not be able to observe or subsequently recover them. ELECTRONIC STORAGE OF PASSWORDS IN READABLE FORM Passwords must not be stored in plain text or in other readable forms in places where unauthorized parties might recover them, including batch files, login scripts, computers without access control, terminal function keys or software macros. ENCRYPTION OF PASSWORDS Passwords must always be encrypted when held in storage for any significant period of time or when transmitted over networks. This will prevent them from being disclosed to wiretappers, technical staff that is reading systems logs and other unauthorized parties. USE OF SAME PASSWORD PROHIBITED While the specific generation retention depends on the computer system, users on all systems are prohibited from reusing a password when prompted to change it by the system. System administrators and other users with similar access privileges are prohibited from using the same password on multiple systems. SUSPECTED DISCLOSURE FORCES PASSWORD CHANGES Users must promptly notify the service desk if they suspect or know that their password integrity has been compromised. The password must be changed immediately. 3 Source: www.knowledgeleader.com PASSWORD SECURITY POLICY: SAMPLE 2 Prepared By: Approved By: Revision Date: Effective Date: The following sample outlines a set of policies and procedures governing the creation and use of user passwords to protect Company X's computer systems. PURPOSE The purpose of this policy is to define the standard for creating strong passwords for all users. Password security, password changes and other password rules help protect the Company X technology resources from harmful acts. SCOPE The scope of this policy includes all users. Users are defined as anyone with authorized access to Company X technology resources, including permanent and temporary employees or third-party personnel such as temporaries, contractors, consultants and other parties with valid Company X access accounts. System-level password usage is covered in the system, database and application administrator policy and falls outside the scope of this policy. POLICY Passwords are an important aspect of computer security and are the front-line of protection for Company X user accounts. A poorly chosen password may result in the compromise of the Company X global network. Users of Company X technology resources are therefore responsible for taking appropriate steps in selecting and securing their passwords. DEFINITIONS • Technology Resources: Technology resources are all computing, networking and software applications that can be accessed by authorized Company X users. • User: Users are anyone with authorized access to Company X technology resources, including permanent and temporary employees or third-party personnel such as temporaries, contractors, consultants and other parties with valid Company X access accounts. 4 Source: www.knowledgeleader.com PROCEDURES PASSWORD USE POLICY User passwords are sensitive, confidential Company X information and must not be shared with others. Passwords are the first line of protection against threats to network security, whether threats originate internally or externally. Minimum Password Length Wherever the system or application can accommodate, passwords must be a minimum of eight characters in length. Minimum Password Age Password age refers to the time during which a password must be used before a new password can be selected. Where technically possible, the minimum password age at Company X is three days. Password Expiration And History Management Policy • The Company X standard expiration period is 90 days. User accounts are not set to nonexpire. • Passwords must not be repeated within 12 generations. Password Lockout Policy • Users are locked out of their accounts after three failed login attempts. Failed login attempts are the result of attempting to log in using either a faulty login ID (username) or password. • The lockout period remains in force for 30 minutes and the counter is reset after the 30-minute lockout interval. Temporary Passwords First-time Company X computer users (or those requiring a password reset) are given a temporary password that must be changed immediately after the first login. SECURE PASSWORD GUIDELINES The following guidelines are valid throughout Company X to protect information and enhance the security of the network: • If accounts or passwords have been compromised, report the incident to technical support and change all passwords immediately. • If an administrator requires that you log into a machine or service, use precaution so that passwords are not witnessed. • Anyone demanding a password must be reported to technical support. Recommended Strong Password Complexity Company X recommends using the “strong password” complexity guidelines below. This helps ensure that all systems, intellectual property and other sensitive data are afforded a proven level of protection. Strong passwords have the following complex characteristics: • Do not contain personal information (such as the names of family members, pets, hobbies, personal interests, etc.). • Contain both upper (ABC) and lower (abc) case letters of the alphabet in any combination. 5 Source: www.knowledgeleader.com • Have at least one integer (0-9) and one special character (!@#$%^&*()_+|~ =\`{}[]:";'<>?,./) as well as both upper and lower case letters of the alphabet. • Do not use whole words in any language (including slang, dialect, jargon, etc.). Note: It is understood that not all applications running within Company X will accept the recommended level of complexity. Users are advised to employ the maximum amount of strong password techniques that can be accepted by the application being used. Adopt Secure Password Habits Poor or weak passwords are those with the highest probability of being guessed or cracked. Security risks can be avoided by not: • Using a single word found in a dictionary (English or foreign) as a password • Choosing easily guessed words such as: − Names of family, pets, friends, co-workers, fantasy characters, etc. − Computer terms and names, commands, sites, companies, hardware or software • Choosing words, such as “company,” “newyork,” “sanfran” or any derivation • Including birthdays or other personal information like addresses and phone numbers • Using ordered patterns like aaabbb, qwerty, zyxwvuts, 123321 or the like • Choosing passwords that contain any of the above spelled backward • Using passwords that contain standard words preceded or followed by an integer (such as secret1, 1secret, etc.) PROHIBITED PASSWORD SECURITY ACTIVITIES With the adoption of the guidelines mentioned in Section 2, Secure Password Guidelines, several practices are considered potentially dangerous to the user’s system or entire network. Prohibited activities include: • Revealing or sharing passwords over the phone to anyone, including people claiming to be from technical support, help desk or another official-sounding organization • Sharing passwords with family members • Revealing passwords in an email message • Revealing passwords to an administrative supervisor • Talking about passwords in front of others • Inserting passwords into email messages or other forms of electronic communication • Creating passwords at Company X that are the same as passwords used for personal accounts • Hinting at the format of a password ("my family name") • Revealing passwords on questionnaires or security forms • Revealing passwords to co-workers while on vacation or a leave of absence • Using the Remember Password feature within applications (those available in Eudora, Outlook Express, Internet Explorer or Netscape Messenger) • Writing passwords down • Storing passwords in a file on any computer system (including PDAs or similar devices) without using encryption methods ENFORCEMENT 6 Source: www.knowledgeleader.com Network activities may be monitored and logged to ensure compliance with the rules established in this and other ISS policies, procedures, standards and guidelines. Any user found to have violated this policy may be subject to disciplinary action, including termination of employment, legal action as appropriate or both. No provision of this policy will alter the at-will nature of the employment relationship at Company X. POLICY UPDATE AND NOTIFICATION Company X reserves the right to revise the conditions of this policy at any time by giving notice via the information security policy update procedure. Users are responsible for understanding or seeking clarification of any rules outlined in this document and for familiarizing themselves with the most current version of this policy. RELATED DOCUMENTS • System, Database and Application Administrator Policy • Exceptions and Non-Conformance Policy • Policy Exceptions and Non-Conformance Standard • Information Security Policy Update Procedure 7 Source: www.knowledgeleader.com PASSWORD SECURITY POLICY: SAMPLE 3 Version Date Authors Notes PURPOSE The purpose of this password policy is to ensure that all Company X systems are properly secured and that passwords are consistently applied. SCOPE Company X’s system environment must be configured consistently to provide the highest levels of security, availability and integrity. This policy provides overall guidance for the consistent application of system passwords in Company X’s system environment. PASSWORD SECURITY • Written passwords must never be publicly displayed or left in unsecured places. • Password controls apply to all user accounts issued to individuals for access to Company X’s computing resources. These controls do not apply to special processing or system accounts not intended for interactive login. These controls are intended to be minimum standards. Additional levels of controls are not prohibited. • Owners are responsible for ensuring that password rules are enforced by automated controls when available. • Users are responsible for complying with password rules when automated controls are not available. • Passwords must comply with the following: − First-time passwords must be set to a unique value for each user and changed immediately after the first use. − Passwords must be at least seven characters in length. − Passwords must contain at least one letter and at least one number. − Passwords must not match one of the last four passwords used. − Passwords must be changed, and inactive user accounts must be removed at least once every 90 days. − Passwords must be in effect at least one day before the change. − Account lockout occurs after six invalid login attempts within a 24-hour period. − Account lockout duration must be set to 30 minutes or until an administrator enables the user ID. − Password login must occur within 15 minutes of idle time. − Access for any terminated users must be immediately revoked. Some systems attempt multiple authentications with each user login attempt. On these systems, technical controls may be set to a higher number to reflect the actual number of user login attempts as accurately as possible. 8 Source: www.knowledgeleader.com • Passwords must never be revealed to anyone with two exceptions. − Initial setup of user accounts − During an incident-response investigation • Address the control of adding, deleting, and modifying user IDs in the data access and user authentication standard. • Authenticate all access to any database containing cardholder data. This includes access by applications, administrators and all other users. • Ensure that the owner reveals passwords for vendor-supplied user accounts or shared accounts to only those users with a legitimate need as determined by the owner. • Reveal individual user passwords in an emergency. The user must change the password at the first opportunity immediately after. • Change vendor-supplied passwords immediately upon completion of system installation. Any vendor-supplied accounts not needed for system operation should be deleted or disabled upon completion of installation. • Enable accounts used by vendors for remote maintenance only during the period needed. • Identify systems that are designed to require the use of a shared user account in such a manner that it is inappropriate to use an individual's account. For these systems, a special user account will be set up and it may be required that the password be shared. Users are strictly forbidden from using these special accounts or any vendor-supplied account for any purpose other than the system operation for which they are created. • Ensure that individually assigned user account passwords are not stored electronically. • Set passwords for all systems to (Need to Identify Current Process – Insert Name) for normal user-requested password resets performed by the help desk. • Authenticate user-requested password resets. In the case of automated password reset systems, at least two predefined questions must be answered correctly. For help desk resets, the help desk will verify based on the requestors’ pin number. (What systems are we talking about?) • Develop a procedure to communicate password procedures and policies to all users who have access to cardholder data. • Ensure that service account passwords required for script or program execution are not stored electronically if a more secure option is reasonably available. If a password must be stored electronically in clear text for script or program execution, the file containing the password must be protected from unauthorized access using file permissions. Read permissions will be granted only to: − Default system accounts − Administrators − Quality assurance − Service accounts that execute the script or program 9 Source: www.knowledgeleader.com