While people applaud easier password guidance from NIST, easier is not better. Here’s what you need to consider when creating a company password policy. Credit: Ben Patterson / IDG Changes to the National Institute of Standards and Technology (NIST) password guidelines were welcomed as long overdue. Security professionals criticized the old guidelines, which recommended a mix of numbers, letters and special characters that are changed periodically.When I read the new document, I was surprised that it doesn’t account for very common attacks. In short, NIST guidance leaves people who rely solely upon passwords for authentication, which seems to be a majority of accounts, more vulnerable.Most of the NIST document focuses not on passwords, but on other authentication mechanisms such as token authentication. Passwords as a sole authenticator are only allowed for low-level accounts. This is generally a risk-based decision, although the reality is that most accounts rely on password-only authentication.Password strengthRegarding passwords, what is not changed is that easily guessed passwords such as dictionary words are not allowed. They do state that there should be rate limiting for log-on attempts to lock out people who attempt brute force password guesses. However, this is also one the most annoying password security features, and much more frequently locks out legitimate users than stops attacks. The major change that everyone is applauding is that special characters should not be required as long as the password is not an easily guessed word. The new guidance also recommends not requiring periodic password changes.This looks great, as you don’t have to change passwords frequently. While I don’t necessarily bemoan the lack of special characters, I do take exception with the lack of password changes in the absence of additional authentication mechanisms. Password crackingSo how much of this new guidance will be appropriate for your company’s password policy? To answer that, let’s first look at how accounts are usually compromised. Most authentication attacks appear to result from phishing attacks or reuse of stolen password files. The hacks of credentials from Yahoo! and similar sites results in postings of account credentials on the dark web. Criminals then take these credentials and attempt to use them on banking websites or companies if the credentials are tied to corporate accounts. Whether it is through phishing or stolen accounts, the strength or composition of the compromised password is irrelevant.[Related: The 6 best password managers]The new guidelines potentially make it simpler for password cracking tools to run against compromised password files. Bill Burr, the author of the original NIST guidelines, stated that an eight-character password with special characters would be cracked faster than a 20-character password without special characters, but there is nothing in the new guidance requiring more than eight characters anyway.A practical password policyHere’s what I suggest for a reasonable approach to a practical, workable password policy:Implement muti-factor authentication for all accountsCreate awareness campaigns for password security that discourage reusing passwords and writing down passwords, and instructs employees to protect multi-factor authentication devices and passwords.Allow users to use any password of their choosing.If you do not implement multi-factor authentication:Continue to enforce periodic password changesImplement NIST guidance preventing guessable passwordsImplement password login rate limitingImplement awareness campaigns that highlight how to create strong, but memorable passwords, prohibit passwords reuse, protect the passwords, and prevent phishingIf you do not require passwords with special characters, passwords need to be longer to provide the same level of securityPassword resetWhile I find forced password changes annoying, waiting until you know there is a password compromise to change passwords is ignorant. For example, you will not be aware when people use their organizational credentials for Pokemon Go accounts, as many do. If that site is compromised and an employee has reused company passwords on it, your organization is now vulnerable. Even if the employee doesn’t use your organization’s email address, your organization is still vulnerable in a targeted attack if the password was reused across accounts. If you do not force periodic password changes, your organization is vulnerable as long as the employee has a valid account at the organization.The case for multifactor authenticationThe solution to exponentially reduce the risk to these attacks is to implement multifactor authentication. The NIST document advocates other authentication schemes besides passwords, a message missed by the media and readers giddy about not having to change or create complex passwords.The reality is that most companies will not implement more costly or technically complicated authentication tools for a variety of reasons. Even security professionals seem to believe that the presence of those tools gives them a green light to weaken security. If people would actually follow the NIST guidance in its entirety, there would be better security. That includes reading and acting on the proverbial fine print that mitigates weaker passwords.More on passwords: Passwords: A long goodbyeEven weak hackers can pull off a password reset MitM attack via account registrationTop 25 worst-of-the-worst, most common passwords used in 2016 Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe