NIST's New Password Rule Book

NIST's New Password Rule Book

100635 Journal vol 1 2019_Layout 1 12/12/18 12:52 PM Page 18 FEATURE NIST’s New Password Rule Book Updated Guidelines Offer Benefits and Risk Overview of the New Guidelines Do you have Previous NIST guidelines advocated a conventional something www.isaca.org/currentissue approach to password security based on policies to say about this such as strict complexity rules, regular password The updated US National Institute of Standards and article? resets and restricted password reuse.2 NIST’s new Technology (NIST) standards on password security Visit the Journal pages standards take a radically different approach.3 For published in the NIST Special Publication (SP) 800- of the ISACA® website example, password changes are not required unless 63-3 “Digital Identity Guidelines”1 represent a novel (www.isaca.org/journal), there is evidence of a compromise, and strict approach to improve IT security while working with, find the article and click complexity rules have been replaced by rather than against, the capabilities and limitations on the Comments link to construction flexibility, expanded character types, share your thoughts. of the weakest link in information security: the greater length and the prohibition of “bad” (i.e., users themselves. The updated NIST guidelines https://bit.ly/2zMRYU3 insecure) passwords. NIST’s new guidelines have offer adopters a number of advantages in usability the potential to make password-based and security while introducing new risk and authentication less frustrating for users and more implementation challenges. These issues should be effective at guarding access to IT resources, but carefully considered before, during and after there are tradeoffs. implementation of the new guidelines. The password requirement basics under the updated NIST SP 800-63-3 guidelines are:4 • Length—8-64 characters are recommended. • Character types—Nonstandard characters, such as emoticons, are allowed when possible. • Construction—Long passphrases are encouraged. They must not match entries in the prohibited password dictionary. • Reset—Required only if the password is compromised or forgotten. • Multifactor—Encouraged in all but the least sensitive applications. Bachman Fulmer, Ph.D., CISA Is an assistant professor of accounting at the University of Tampa (Florida, USA). He has worked in technology risk and assurance services for EY and as an internal auditor focused on technology, compliance and business process improvement. Melissa Walters, Ph.D. Is an associate professor of accounting at the University of Tampa. She has worked in systems implementation, control and support areas and teaches information systems and information systems control/auditing. Bill Arnold, CISSP Is the director of information security at the University of Tampa and is an information security analyst working in the areas of information security planning, implementation, assessment and management. 18 ISACA JOURNAL VOL 1 100635 Journal vol 1 2019_Layout 1 12/12/18 12:52 PM Page 19 Benefits and Risk, From the User’s phrase “Robert has been a Spartans fan since 7 Perspective 2010!” would generate “RhbaSfs2010!”). This 12- Enjoying character acronym generally meets strict password this article? The updated NIST password guidelines are construction requirements and provides sound designed to enhance security by addressing the security. However, the new NIST standards • Read human factors that often undermine intended encourage the use of the entire passphrase rather Implementing the password protection. Under the traditional approach than just the acronym. The 44-character original NIST Cybersecurity to password construction, users are asked to phrase presents a much greater cryptographic Framework. generate highly complex and difficult-to-guess challenge to crack than the 12-character acronym www.isaca.org/ passwords. These passwords must be reset on a and is probably easier for the user to remember. US-cyber- regular schedule, and restrictions generally prevent Figure 1 compares the NIST password approach to implementation users from consecutively recycling passwords. the traditional password approach. • Users are also instructed to refrain from using the Learn more same or similar passwords on multiple IT systems. about, discuss As all users know, this makes remembering and collaborate passwords very difficult. Otherwise well-intentioned UNDER THE NEW on information individuals often cope with these challenges by and cybersecurity ignoring advice and defaulting to common, easy-to- GUIDELINES, USERS ARE ISACA’s Online remember passwords, cycling previously used ENCOURAGED TO SELECT Forums. passwords, and making only minimal changes https://engage. between resets, among other effort-reducing LONGER, MEMORABLE isaca.org/online strategies.5 Others simply write them down and PASSPHRASES RATHER forums 6 post them in a convenient, but insecure location. THAN CRYPTIC Under the new guidelines, users are encouraged to CHARACTER STRINGS WITH select longer, memorable passphrases rather than cryptic character strings with complex construction COMPLEX CONSTRUCTION rules, as it is easier for users to remember coherent RULES. phrases than strings of random characters. This same logic inspired conventional advice to generate secure passwords via acronyms based on easily The new guidelines offer users increased flexibility remembered phrases that are meaningful to the and security without necessarily forcing them to user (e.g., taking the first letter of each word in the change their concept of a secure password. While Figure 1—Password Updates NIST Passwords Traditional Passwords Long memorable passphrases are encouraged. Length can be seen as an obstacle as it adds complexity. Example: “NIST passphrases make long passwords easy!” Example: “[z2#DSGDnr=[6y@g<q{@” Example: “I really look forward to spring weather in Upstate New York.” Memorable might be easy to guess. Example: “P@$$wORD” Problematic passwords are rejected by a dictionary. Example: Common passwords such as “123456” or Strict construction rules guide acceptable choices. “qwerty” and locally relevant passwords like a Example: Minimum length of eight upper and lower case mascot or team name characters, numbers, punctuation, or some combination of the above. Multifactor authentication provides an extra layer of security (e.g., mobile applications/software tokens, hardware tokens, biometrics, key fobs). ISACA JOURNAL VOL 1 19 100635 Journal vol 1 2019_Layout 1 12/12/18 12:52 PM Page 20 the guidelines facilitate and encourage the use of are rejected based on a specialized list. In the longer passphrases, the only construction absence of specific construction rules or restriction imposed under the NIST guidelines is a transparency into the prohibited list itself, users minimum eight-character password length. As such, may become frustrated if they encounter a series of users are not actually required to create passwords rejections. Moreover, for some users, a message that are appreciably different from those to which simply stating that their desired password was not they are accustomed under traditional complexity accepted because it appears on a prohibited list rules. They need only ensure that their password or may not be enough information to make their passphrase is of sufficient length and does not subsequent attempts successful. For users to take appear in a dictionary of prohibited passwords. full advantage of the opportunities for increased security, targeted training and support may be necessary. At the very least, users need basic guidance on how to select acceptable passwords NIST’S GUIDELINES under the new NIST guidelines or they may become 9 ALSO ENCOURAGE frustrated with the process. MULTIFACTOR A lingering threat is the ability of attackers to use personal information from public sources or to AUTHENTICATION IN ALL employ social-engineering techniques to make BUT THE LEAST SENSITIVE intelligent guesses at credentials. The example passphrase “Robert has been a Spartans fan since APPLICATIONS. 2010!” has many of the hallmarks of a good password: It is easy for the user to remember, is sufficiently lengthy and includes a variety of Users will also appreciate not having to change their character types. However, if the individual posts his password on a predefined schedule. Regular university affiliation, interest in school sports and password changes, which prevent the use of graduation date on Facebook (or other social compromised passwords over an extended period media), a motivated attacker could easily gather of time, create headaches for users who must and use this kind of personal information to shorten continually generate and remember new the path to a successful password guess. This type passwords. Users often compensate by making of vulnerability is not unique to the NIST guidelines, only small modifications to the password (such as but the greater flexibility allowed in password adding or switching a single character), which construction could make this weakness a more undermines the intent of the policy. The increased significant issue. effort incurred by forcing users to make regular password changes most likely outweighs the Benefits and Risk, From the Security potential benefit unless there is evidence of a Professional’s Perspective system breach or reason to believe a particular account has been compromised.8 Correspondingly, Security professionals are well aware that existing the new NIST guidelines recommend password guidelines designed to make passwords more resets only in cases where

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us