Insights

We’ve All Got Password Fatigue, But Are NIST’s New Policies Wise?

J.S. Held Releases Insights on Risks & Opportunities Expected to Impact Organizations in 2025

Read More close Created with Sketch.
Home·Insights·Articles

Introduction

Ah, the necessary evil of passwords.

Those of us who have worked in organizations that require users to change passwords at set intervals know what I mean.

Typically every three to six months, users are requested to perform a password change – maybe in the form of an annoying pop-up alert. In some setups, the user is locked out of the system until a new memorable password (but one that follows the complex password creation guidelines) is set.

A commenter on Slashdot said his previous organization demanded a password change every 45 days. Gulp.

Under that pressure, is it surprising that so many users forget their new passwords or resort to cobbling together poor passwords?

But, it’s no picnic for IT teams either. IT represents one of the most under-resourced, yet critical departments in many an organization. The 'regularly changing your password policy' demands that IT manage this whole process, including when users forget their ‘memorable’ passwords. It takes time, effort, and money to run this security policy.

And part of the reason regular password resets have been enforced is because organizations like the United States National Institute for Standards and Technology (NIST) have advocated this approach… until recently.

New Password Guidelines from the NIST

The NIST released a draft of its Digital Identity Guidelines: The Special Publication 800-63-3b. No longer does the NIST recommend forced password changes or additional complexities when asking users to select a password.

In fact, they seem to prefer the term 'Memorized Secrets' over passwords:

“A 'Memorized Secret' authenticator (commonly referred to as a password or, if numeric, a PIN) is a secret value that is intended to be chosen and memorable by the user. Memorized secrets need to be of sufficient complexity and secrecy that it would be impractical for an attacker to guess or otherwise discover the correct secret value.”


In fact, way back in 2009, the NIST admitted that enforced password changes were a source of frustration to the user.

According to the NIST guidelines, the new draft rules on password policies include the following:

 
---
---

For the IT security industry, this is a big deal, and a contentious one. Reputable experts around the world are split on this issue.

See what side of the fence you sit on:

Arguments for regularly changing your passwords:

  • If your details get stolen directly or via a third-party, you are only vulnerable for a set amount of time, as opposed to indefinitely.
  • It forces IT to review account permissions and ensure only authorized users have access.
  • Remote network access increases a firm’s exposure to risk, so changing passwords after sessions reduces the likelihood of unauthorized access.

Arguments against regularly changing your passwords:

  • Users forced to change passwords often are more likely to use bad passwords.
  • Users are more likely to use the same passwords for multiple accounts.
  • Frustrated users are more likely to create secret work-arounds to simplify the process, which may put the organization at increased risk.

Oh, and before you make your decision, check out the NIST list of mitigation tactics against authenticator threats. We find it quite comprehensive. New mitigation approaches and technologies – and indeed, new threats – have changed the threatscape. See section 8.2 of the Digital Identities draft.

 
---
---

The topic is certainly divisive, especially if you manage an IT environment that enforces regular password changes.

For those organizations that do consider moving away from the practice, below are some guidelines for migrating to the concept of memorized secrets.

 
---
---

Acknowledgments

We would like to thank Kevin Gorsline for providing insight and expertise that greatly assisted this research.

Kevin Gorsline is a Managing Director in J.S. Held's Global Investigations Practice who joined following J.S. Held's acquisition of TBG Security. For several years, Kevin served as the Chief Operating Officer and head of the Risk and Compliance practice at TBG Security, where he was responsible for providing the leadership, management, and vision necessary to ensure that the company had the proper operational controls, administrative and reporting procedures, and people systems in place to effectively grow the organization and to ensure financial strength and operating efficiency. His experience and leadership throughout his career have been focused on developing and delivering information security services and solutions, providing outstanding client service, and driving profitable revenue growth. Kevin brings established proficiency as an IT leader with extensive experience in risk and compliance services, applications development, and implementation projects both in the United States and abroad.

Kevin can be reached at [email protected] or +1 843 890 8596.

Find your expert.

This publication is for educational and general information purposes only. It may contain errors and is provided as is. It is not intended as specific advice, legal, or otherwise. Opinions and views are not necessarily those of J.S. Held or its affiliates and it should not be presumed that J.S. Held subscribes to any particular method, interpretation, or analysis merely because it appears in this publication. We disclaim any representation and/or warranty regarding the accuracy, timeliness, quality, or applicability of any of the contents. You should not act, or fail to act, in reliance on this publication and we disclaim all liability in respect to such actions or failure to act. We assume no responsibility for information contained in this publication and disclaim all liability and damages in respect to such information. This publication is not a substitute for competent legal advice. The content herein may be updated or otherwise modified without notice.

You May Also Be Interested In
Perspectives

Untangling The Fraud: Utilizing Data Analytics to Investigate Ponzi Schemes

How data analytics, combined with other forensic accounting tools, can help investigators uncover Ponzi schemes and other frauds....

Perspectives

Greenhushing: What It Is & Why It Matters

The consequences of greenhushing as they relate to litigation, reputational risks, and progress toward global sustainability goals....

Perspectives

Data Privacy for the Future: Strategies to Limit Digital Risk and Liability

This article examines how to limit the digital risk and liability while protecting data privacy and looks back at previous data privacy predictions....

 
INDUSTRY INSIGHTS
Keep up with the latest research and announcements from our team.
Our Experts