Death of the Complex Password
However, new guidelines from the National Institute of Standards and Technology (NIST) have been making headlines. Here’s what you need to know.
Factors Behind the New Guidelines
NIST acknowledges that the intention of the previous standards — to create more secure passwords through criteria such as complexity — has been circumvented over time by several issues.
End users have difficulty remembering complex passwords, especially when they change frequently. As a result, many people use ineffective variations of common passwords (e.g., Password1!) or store passwords in unsafe ways, such as in a document on their computer or sticky notes on their desk.
At the same time, password-cracking software has become more sophisticated, and keylogger software and social engineering have emerged as effective means of compromising lengthy, complex passwords. Millions of compromised passwords are in circulation due to cyber breaches.
What the New Guidelines Recommend
The new NIST guidelines steer away from requiring complexity and frequent password changes. Instead, the focus is on layered security, which we have long advised.
- Comparing passwords against a “blacklist” that rejects passwords:
- Used in previous compromises
- Based off dictionary words
- Containing repetitive or sequential characters
- Based off items such as user name, system name, etc.
- No forced composition rules (like alphanumeric and special characters) or required arbitrary changes
- Limiting the number of password attempts before a user is locked out
- Multi-factor authentication
With these criteria, simple passwords still cannot be used, and the recommended minimum number of characters is still eight for user-chosen passwords or six for randomly generated passwords or PINs. While the recommendation is not to impose composition rules, alphanumeric or special characters may still be used in an effort to create a memorable password that is not a dictionary word.
It’s important to note that the new recommendations are extensive, and this is just a summary of one aspect of these recommendations. While it may seem that the new standards make passwords easier for end users, there is much more to the authentication process than passwords.
The standards reinforce layered security controls, which we already recommend. Many industry experts consider these “must have” additions to passwords for high-risk systems.
Most organizations use systems configured and managed by third parties, and it will likely take time to see industry-wide changes in response to these revised standards.
In the meantime, it’s vital to layer cybersecurity controls so that if one fails, others are in place to help protect your organization. Here are five steps you can take to strengthen your organization’s cybersecurity defenses.
If you have any questions, please contact us at email@example.com.
Cyber-related services are provided by Traina & Associates, a CapinCrouse company. Traina & Associates is an authorized trade name of Capin Technology LLC, a subsidiary of Capin Crouse LLP.
Lisa is a partner at Traina & Associates, a CapinCrouse company. She uses her more than 30 years of experience to assist organizations in implementing measures to secure data and manage risks efficiently and effectively. She is a nationally recognized speaker and author, and serves on the AICPA Cybersecurity Task Force. Lisa founded Traina & Associates in 1999 to provide IS security services to a broad range of industries. Traina & Associates joined CapinCrouse in January 2017.