policies:password_policy
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
policies:password_policy [2016/07/14 21:05] – created peter | policies:password_policy [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 7: | Line 7: | ||
* Vetting User identity when issuing or resetting a password; | * Vetting User identity when issuing or resetting a password; | ||
- | |||
* Account passwords must comply with the following password strength requirements: | * Account passwords must comply with the following password strength requirements: | ||
- | |||
* Account passwords associated only with Controlled or Published Data must: | * Account passwords associated only with Controlled or Published Data must: | ||
- | |||
* Be at least 6 characters in length; and | * Be at least 6 characters in length; and | ||
- | |||
* Be minimally composed of case sensitive letters and digits. | * Be minimally composed of case sensitive letters and digits. | ||
- | |||
* Account passwords associated only with Controlled or Published Data must not: | * Account passwords associated only with Controlled or Published Data must not: | ||
- | |||
* Include personal information such as your name, phone number, identify number, date of birth, or addresses; or | * Include personal information such as your name, phone number, identify number, date of birth, or addresses; or | ||
- | |||
* Be composed of a single word found in a dictionary | * Be composed of a single word found in a dictionary | ||
- | |||
* Account passwords associated with Confidential Data must: | * Account passwords associated with Confidential Data must: | ||
- | |||
* Be at least 12 characters in length; | * Be at least 12 characters in length; | ||
- | |||
* Contain letters, numbers, and special characters (for example \! @ # $ % & * ( ) - + = < >) | * Contain letters, numbers, and special characters (for example \! @ # $ % & * ( ) - + = < >) | ||
- | |||
* Systems hosting Confidential Data must also be able to accommodate a reasonably long password length to support the use of longer passphrases. | * Systems hosting Confidential Data must also be able to accommodate a reasonably long password length to support the use of longer passphrases. | ||
- | |||
* Account passwords associated with Confidential Data must not: | * Account passwords associated with Confidential Data must not: | ||
- | |||
* Include personal information such as your name, phone number, social security number, date of birth, or addresses; | * Include personal information such as your name, phone number, social security number, date of birth, or addresses; | ||
- | |||
* Be composed of a single word found in a dictionary; | * Be composed of a single word found in a dictionary; | ||
- | |||
* Re-use any of the account' | * Re-use any of the account' | ||
- | |||
* Contain a series of the same character; or | * Contain a series of the same character; or | ||
- | |||
* Contain the user's account name. | * Contain the user's account name. | ||
- | |||
* All password change procedures must include the following: | * All password change procedures must include the following: | ||
- | |||
* Authentication of the user prior to changing the password (acceptable forms of authentication include answering a series of specific questions, showing one or more forms of photo ID, etc.). | * Authentication of the user prior to changing the password (acceptable forms of authentication include answering a series of specific questions, showing one or more forms of photo ID, etc.). | ||
- | |||
* The new password must comply with password strength requirements associated with the data classification for the service in question. | * The new password must comply with password strength requirements associated with the data classification for the service in question. | ||
- | + | | |
- | | + | |
* Unattended computing devices must be secured from unauthorized access using a combination of physical and logical security controls commensurate with associated risks. | * Unattended computing devices must be secured from unauthorized access using a combination of physical and logical security controls commensurate with associated risks. | ||
For more information on creating secure " | For more information on creating secure " | ||
policies/password_policy.1468530323.txt.gz · Last modified: 2020/07/15 09:30 (external edit)