TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/tip/Why-its-time-to-expire-mandatory-password-expiration-policies

Why it's time to expire mandatory password expiration policies

By Peter Loshin

Organizations that enforce a password expiration policy need to face facts: Password expiration policies are great security theater, but they do more harm than good.

A password is a shared secret used to authenticate a user. In technical terms, this shared secret serves as a "what you know" authentication factor. If you know the account password, the system authenticates you and grants access to the account. For many users, password security is the most visible aspect of cybersecurity they encounter on a regular basis.

How can organizations protect against cybercriminals who guess or otherwise gain access to account passwords? The well-worn solution, as old as multiuser mainframes, is to use a password expiration policy to force user accounts to change their password after a specific number of days, weeks or months.

In the early days of multiuser mainframe computing, a password expiration policy was good enough protection. The policies set password length and password age to reflect how long it would take an attacker to crack system passwords. Then, as now, mandatory password expiration could call for new passwords anywhere from once a year to once every 30, 60 or 90 days. A password with six alphanumeric characters was likely long enough to protect it from brute-force attacks on early mainframes. This was considered sufficient to protect against a cyber attack.

Evolution of password policies

That same six-character password, however, can now be cracked in real time -- or close to it -- with commercial off-the-shelf computer systems and freely available software. As it became easier to break six-character passwords that could be as simple as "123456" or "ABCDEF," experts began adding to an ever-expanding set of tactics for making passwords harder to crack. More accelerated password expiration dates were also adopted, increasing the number of password resets from once a year to four, six or even 12 times a year. Over time, tactics such as the following addressed ways to make passwords harder to guess:

Fast forward to today, and only the first of these tactics -- longer is stronger -- still works reliably. The rest have been proven to not do much to improve password security.

Length is strength holds true

In 2017, NIST released guidance on mandatory password policies that reflected the new reality: An exploited password file can now be cracked in hours rather than weeks or months. Changing passwords every 90 days could leave an exposed password usable by an attacker for up to three months. NIST maintained it was far better to require passwords be changed immediately when an exploit has been detected, rather than requiring changes four times a year, even with no detected risk. If a strong password never expires -- and the password is never compromised through theft or attack -- the user never has to change that password.

As for the password itself, longer is better. Complexity is not an issue: A 12-character password consisting only of letters and numbers is stronger than an eight-character password with restrictions on the exact attributes that would make a password easy to remember.

Other previously effective password security tactics -- making passwords more complicated and mandatory 30/60/90-day password changes -- all reduce security, while increasing security theater.

What works for password security

The new consensus on password-changing policies is that they are unnecessary. Even the most rigorous password change policies don't delay determined password crackers. Frequent changes mean users often resort to unsafe practices to remember those passwords, including the following:

To improve password effectiveness, it is better to develop and deploy appropriate password guidelines, while focusing more resources on issues like the following:

Organizations can best improve password protection by strengthening password management workflows and enabling users to change their own passwords through automated password change systems.

Modern guidelines for secure password policies

Passwords are the historically accepted mechanism for user authentication, even though they are increasingly not fit for that purpose. Modern authentication and password management best practices focus on the following:

Multifactor authentication (MFA) is also increasingly included in the user authentication process. Since MFA may be seen as a burden by users -- especially those who have been struggling with mandatory password resets -- removing mandatory password resets can take the sting out of MFA deployment.

26 Oct 2022

All Rights Reserved, Copyright 2000 - 2026, TechTarget | Read our Privacy Statement