University of Arizona Standard for Password Construction and Management 1. Overview Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of individual systems, data or even the entire University of Arizona network. All University of Arizona affiliates, including contractors and vendors, with access to University resources are responsible for taking the appropriate steps, as outlined below, to construct, secure and maintain their passwords. 2. Purpose The purpose of this document is to establish standards for password construction, protection and expiration. 3. Scope This standard applies to all University of Arizona affiliates with access to any resource that supports or requires a password. Specifically this standard applies to all resources residing at any University of Arizona facility; having access to the University of Arizona network; or storage of any non-public University of Arizona information. This is a minimum standard, and departments are encouraged to maintain stricter limits where practical. 4. Standards All university-affiliated passwords should meet the standards described below. 4.1 Construction One of the first things an attacker may do is run a program that attempts to guess the password of the target. These programs contain entire dictionaries of several languages. In addition to containing dictionary word lists, they frequently create words and contain word lists from popular culture, such as, slang terms, movies, novels, etc. With this in mind, users should construct a password that meets the following criteria: Passwords should ALWAYS contain: At least eight characters Both upper and lower case characters (e.g., a-z, A-Z) At least one number (e.g., 0-9) At least one special character (e.g., !@#$%^&*()_+|~-=\`{}[]:";'<>?,./) Passwords should NOT Be based on personal information, such as, names of family, dates, addresses, phone numbers, etc Be based on work information, such as room numbers, building name, co-worker's name, phone number, etc Revision 2/5/2016 Page 1 of 5 University of Arizona Standard for Password Construction and Management Use word or number patterns like, aaabbb, qwerty, zyxwvuts, 123321, abcABC123, etc. Be a word or combination of words found in any dictionary in any language, slang, dialect, jargon, etc. Be based on your username, your real name, handle, nickname, screen name, etc. The following section describes how to create a password which includes all or most aspects of the criteria above making it hard to guess yet easy to remember. One way to meet the suggested criteria is to mix special characters, upper and lowercase letters, and numbers, and associate them with a phrase or song titles. The following tables demonstrate these rules in a Good, Better, Best practice. Example I: Phrase: Home of the University of Arizona Wildcats Good Better Best hOTuoAw-C H0tUoaW-c 8O7u0@w-[ Lower Case h, Upper Case H, Upper Case O, Upper Case T, Number zero (represents the letter o), Lower case t, th Number 8 (h is the 8 letter in the english alphabet), Upper Case O, Lower Case u, Lower Case o, Upper case U, Lower case o, Upper Case A, Lower case a, Lower Case w, A hyphen between Wildcats, Upper Case C Upper case W, A hyphen between Wildcats, Lower case c Number 7 (sort of looks like a T), Lower Case u, Number zero (represents the letter o), At sign (at sign begins with the letter a), Lower Case w A hyphen between Wildcats, The left square brace, since it looks like an upper case C Example II: Phrase: Why did the chicken cross the road? Good Better Best WdTcCtR? YdTCxtR? Y?47CxtR Upper Case W Lower Case d Upper Case Y (Why equals Y), Lower Case d, Upper Case T Upper Case T, Upper Case Y, Question mark (Y is the question, right?), Numeral 4 (the letter d is the th 4 letter in the english alphabet), Revision 2/5/2016 Page 2 of 5 University of Arizona Standard for Password Construction and Management Lower Case c Upper Case C, Upper Case C Lower Case x (the letter x is a cross), Lower Case t, Upper Case R, Question mark Lower Case t Upper Case R Question mark Numeral 7 (still looks like a T), Upper Case C, Lower Case x, Lower Case t, Upper Case R You can make strong passwords by simply substituting numbers for letters or words (or vice versa). Such as: E equals 3, I equals 1, O equals 0 (zero), for equals 4, two equals 2, B equals 8, see or sea equals C, etc. Additionally, you should add a special character in the middle. The best passwords are created using an easy to remember phrase as outlined in the above table. More examples of strong passwords follow: My four children are wonderful when they're sleeping m4caW,wts My anniversary is April 4 remember that date Maia4,rtd Ali Baba had forty thieves @Bh?4tyt Wildthing Wild*7H1ng OR Use r3d-j3llo instead of redjello (substitute the E's with 3's) Use B,cl1nt0n instead of bclinton (substitute I & L with 1's and O with zero) Use j0hn(80y) instead of johnboy (substitute the O's with zeros & the B with 8 NOTE: The above referenced examples should not be used as passwords. 4.2 Protection Passwords are an important tool available to users to protect their resources. Unfortunately, people are not accustomed to memorizing difficult passwords that include numbers and weird characters. This is made more difficult due to the ever-increasing number of passwords required in today's world. Many people have chosen to write down their passwords and keep them in an unsecured area, such as under their keyboard or stuck to their computer screen. All users should use the following security measures to protect their passwords and associated accounts: Passwords should be memorized and never written down or stored on-line. If you must write down a password it must be stored in a secure location allowing only authorized access. Passwords assigned to individuals should never be shared with anyone, even your supervisor. All passwords must be treated as sensitive/confidential information. Anyone requesting an individual’s password should be referred to the Information Security Office and this standard. Passwords should not be included in email messages or other forms of electronic communication such as instant messengers, chat rooms, and wireless text messaging, etc.. User accounts that have system-level privileges granted through group memberships or programs such as "sudo" in unix should have a different password than all other accounts held by that user. Always create a new password when joining internet sites, such as eBay, Yahoo, Hotmail, Revision 2/5/2016 Page 3 of 5 University of Arizona Standard for Password Construction and Management Amazon, etc. Don’t talk about a password in front of others or reveal a password over the phone. All default passwords must be changed as soon as possible. 4.3 Maintenance It is important to remember that given enough time any password can be guessed. Therefore, it is critical that passwords be changed frequently. If you use a password that can be guessed in (N) number of days, you would need to change that password in (N-1) days. For example if you used wildthing as your password it could be guessed in less than one hour. Whereas the previously outlined password example of Wild*7H1ng might take six months. Meaning the stronger the password the less frequently it has to be changed. The recommended password change interval is every 120 days even if you construct a password following the recommendations in this standard. 4.4 General If you suspect that an account or password has been compromised, change the password or disable the account immediately, then contact your system administrator or refer to the Incident Response policy. Additional recommended password security measures: Do not use the same password for University of Arizona accounts as for other nonUniversity of Arizona access (e.g., personal Internet account, option trading, benefits, etc.). Where possible, don't use the same password for various University of Arizona access needs. For example, select one password for your NetID account and a separate password for your departmental account. Ideally, you should have different passwords for different systems, such as Windows, Unix, or Macintosh, etc. It is not recommended to use the "Remember Password" feature in applications such as Eudora, Outlook, and Netscape Messenger, which may leave your accounts vulnerable. Never provide any current password or variation of it to an internet site that requests your email address and then requests a password. In an emergency, revealing a password to a trusted individual is permitted, however, that password should be changed immediately after the emergency has passed. 5. Enforcement Password cracking or guessing may be performed on a periodic or random basis by ISO or its delegates. If a password, not meeting these standards is guessed or cracked during one of these scans, the user will be required to change it. If a password is revealed to have been compromised the user will be required to change it. Any employee found to have violated this standard may be subject to disciplinary action, up to and including termination of employment. Revision 2/5/2016 Page 4 of 5 University of Arizona Standard for Password Construction and Management 6. Related Documents Security Definitions used in this policy are available at http://security.arizona.edu/Definitions.pdf Security Standards are available at http://security.arizona.edu/policydrafts.html Guidelines, Policies and Procedures are available at http://security.arizona.edu/guidelinesetc.html Revision 2/5/2016 Page 5 of 5