sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
Password security standards Summary

Password security standards Summary

most popular global standards

  1. NIST (National Institute of Standards and Technology)
  2. PCI-DSS (Payment Card Industry Data Security Standard)
  3. ISO 27001 (International Organization for Standardization)
  4. OWASP (Open Web Application Security Project)
  5. OWASP ASVS (application security verification standard)
  • Standards → developed to cover management practices and the overall architecture of security mechanisms and services

NIST

  • NIST
    • U.S. federal agency that deals with measurement science, standards, and technology related to U.S. government use
    • and to the promotion of U.S. private sector innovation
  • NIST Cybersecurity Framework
    • Framework for Improving Critical Infrastructure Cybersecurity
    • serves as an extensive set of guidelines detailing how organizations can keep cybercriminals at bay.
    • divided into five distinct categories: identify, protect, detect, respond, and recover. While it’s not a complete framework,
    • latest NIST password guidelines to enter the industry, modified in 2017 → many of the organization’s important password recommendations

NIST - guidelines for passwords

  1. The Password length, characters and truncation :
    1. 8 char minimum → user , 6 char minimum → machine , 64 char → max char
    2. Truncation of the secret (password) shall not be performed when processed
    3. support ASCII - spaces - UNICODE ( emojis )
  2. Remove the reset:  – No password expiration period
    1. As users struggle to drum up countless creative, strong new passwords each month, they end up creating weaker passwords.
  3. Complexity isn’t king
    1. Users who forget their complicated passwords tend to end up replacing them with new, weaker ones.
  4. Make it a user-friendly affair
    1. show password while typing
    2. allowing more users to view their passwords as they enter them. Without this option, users are more motivated to choose shorter passwords that are easier to enter correctly.
  5. Lose the clues:  – No password hints
    1. knowledge-based authentication clues can save users from the conflict of creating a new password, they are also risky.
    2. hackers to decode hint prompts and breach systems.
  6. Limit the attempts
    1. maximum of 10 login attempts before they are turned away - enough to aid a forgetful user, but not enough to assist brute-force attackers
  7. A hands-free approach
    1. No SMS texting services for 2FA (use a one-time password from an app like Google Authenticator)
    2. SMS delivery isn’t entirely secure → attacker insert malware into the system → redirect text messages
  8. Check chosen password with known password dictionaries

OWASP

  1. nonprofit foundation that works to improve the security of software through
    1. Tools and Resources
      1. community-led open-source software projects
    2. Community and Networking
      1. hundreds of local chapters worldwide,
      2. tens of thousands of members,
    3. Education & Training
      1. leading educational and training conferences
  2. source for developers and technologists to secure the web.

OWASP - guidelines for passwords

  1. Do do not truncate passwords, every character the user types in is actually included in the password.
  2. at least 3 out of the following 4 complexity rules
    • at least → 1 uppercase character (A-Z), 1 lowercase character (a-z), 1 digit (0-9), 1  special characters as ( space )
  3. at least 10 characters, at most 128 characters
  4. not more than 2 identical characters in a row
  5. Ensure credential rotation when password leak or compromise identification.
  6. Include password strength meter → to help users create a more complex password
  7. block common and previously breached passwords

ISO

  • nongovernmental organization → work results in international agreements that are published as International Standards
  • ISO 27000 Series → Code of Practice for Information Security Management
    • One of the most widely referenced - Originally published as British Standard 7799 and then later as ISO/IEC 17799
    • guidelines for initiating, implementing, maintaining, and improving information security management

Key ISO/IEC 27002 password guidelines

  1. enforce use → user IDs and passwords → accountability
  2. allow users to select and change their own passwords
  3. enforce the choice of quality passwords
    1. easy to remember
    2. not based on anything somebody else could easily guess - or related information
    3. not vulnerable to dictionary attacks
    4. free of consecutive identical as all-numeric
    5. if temporary → changed at the first log-on.
  4. Enforce regular password changes and as needed;
  5. Force users to change temporary passwords at the first log-on
  6. maintain a record of previous user passwords and prevent re-use;
  7. not display passwords on the screen when being entered
  8. store password files separately from application system data
  9. store and transmit passwords in protected encrypt - hash

PCI DSS

  1. set of requirements to ensure sensitive data is protected
  2. privacy is maintained
  3. networking systems are robust enough to withstand cyber-attacks
  • guidelines are published PCI SSC - PCI Security Standards Council
  • PCI SSC → global forum brings together payments industry stakeholders to develop data security standards and resources for safe payments worldwide.
  • PCI standards aren't specific to any one country or organization but rather function as a global set of standards that everyone can adhere to.
  • Requirement 2 and 8 in the document talks about password requirements for logging into cardholder data environments.

PCI DSS - password guidelines

  1. Always change vendor defaults (passwords and settings)
  2. remove or disable unnecessary default accounts before installing a system on the network
  3. Remove/disable inactive user accounts within 90 days
  4. Limit repeated access attempts by locking out the user ID - not more than six attempts
  5. Set the lockout duration to a minimum of 30 minutes or until an administrator enables user ID
  6. If a session has been for more than 15 minutes → require user to re-authenticate to re-activate the session
  7. Passwords should have a minimum length of at least → seven characters and contain both numeric and alphabetic characters
  8. Change user passwords at least once every 90 days
  9. Do not allow an individual to submit a new password that is the same as any of the last four passwords - passphrases they have used
    • passphrase is basically a longer password, usually at least 14 characters in length, with spaces between words
  10. Set passwords for first-time use → change immediately after the first use and upon reset to a unique value for each user
  11. Enforce multi-factor authentication

©sameer fakhoury

GitHubLinkedIn