Industry Insights with Mike Wilson

Account Takeover , Fraud Management & Cybercrime , Governance

Eliminating the Burden of Periodic Password Reset for Active Directory

Examining Your Quarterly Password Reset Policy
Eliminating the Burden of Periodic Password Reset for Active Directory

The most publicized recommendation is throwing away password complexity rules and this recommendation is still hotly contested on many security forums. However, what really catches the attention of most Active Directory and system admins, is the instruction from NIST to not expire passwords. Forced monthly, quarterly or periodic password resets are a sore point for many employees.

Moving to a policy that eliminates periodic password resets has many benefits:

  • It improves user satisfaction
  • It can save IT budget
  • Most importantly, it improves security

Why Did We Start Enforcing Periodic Password Resets?

The original goal of requiring frequent password changes in the mid 2000's was to improve security. If a password is valid for less time, the attacker who discovers it has a shorter window to attack.

 

Before exploring cutting periodic password reset policies, let's consider the background of password expiration policies. The original goal of requiring frequent password changes in the mid 2000's was to improve security. If a password is valid for less time, the attacker who discovers it has a shorter window to attack. This was an effective approach because when this policy was first recommended, employees had fewer accounts to log into and were able to memorize most of their passwords.

Password Reset Effectiveness and Side-Effects:

A Forrester Research study cites that 77% of IT Departments expire passwords for all staff on a quarterly basis. Forrester also cites that it costs $70 of IT Help Desk labor for a single password reset. That is a significant percentage of the IT Help Desk budget. But businesses are discovering that resetting passwords is expensive and to top it off, users hate when their password expires because they have a plethora of online accounts to access in this day and age.

Mercifully, in 2017, NIST confirmed what many in the industry already knew. Changing passwords doesn't improve security, so why cause all the headache for users and IT staff?

NIST explains why in the NIST 800-63B FAQ "Users tend to choose weaker memorized secrets when they know that they will have to change them in the near future." Furthermore, a UNC study also found that if people have to change their passwords every 90 days, they tend to use a pattern and they do what we call a transformation. They take their old passwords, they change it in some small way, and they come up with a new password (for example, Abc123! becoming Abc1234!). Forced periodic password resets produce weak passwords.

Based on these conclusions, most organizations are now actively moving to password policies that don't expire.

What Should Organizations Do Now?

For this new policy to work effectively, organizations must prevent users from selecting "commonly-used, expected, or compromised" passwords (part of the NIST 800-63b guidelines).

The reason for this is simple. Hackers use cracking dictionaries and specialized hardware to guess passwords. Hackers create cracking dictionaries from passwords people have chosen before. They start with compromised passwords available from the many public data breaches. Combined with simple variations, these dictionaries include all the most commonly chosen passwords. It's important to recognize that cracking dictionaries continue to evolve. It's not enough to use a static list of bad passwords as new passwords become compromised on a regular basis due to daily data breaches and leaks.

Following the NIST guidelines involves two steps:

The first step is to check passwords when they are being created.

NIST guidelines state: "When processing requests to establish and change memorized secrets, verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised." NIST 800-63B 5.1.1.

The second step is being able to detect if the password becomes unsafe later. NIST explains:

"Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator." NIST 800-63B 5.1.1.2.

Unfortunately, standard directory plugins and tools do not meet all the criteria above.

The limitation of a password filter is that it only checks at creation or reset. Passwords that were safe yesterday, may be vulnerable tomorrow. The NIST password guidelines also requires a way to detect evidence of compromise in an ongoing fashion.

The Best Approach

The best approach requires that passwords are checked against a continually updated blacklist during all stages of the password and have a tangible action after compromise is detected. This is what you should look for:

  • Password checks must be offered when passwords are being created.
  • Password checks should continue to be performed on an ongoing basis, preferably daily.
  • All password checks should be against a live database, not a static list. A password that was safe yesterday may not be today due to a new breach or leak.
  • If a compromised password is detected, that should trigger an immediate response: When a password is created, a compromised password should prompt feedback to the user that the chosen password is insecure and to select a new one, and when a password is part of ongoing monitoring, that should trigger both an alert and a forced action.

  • With this approach, it is only necessary to force a change when the password is found to be no longer safe instead of the forced periodic password resets. The benefits of this policy include the following:

  • Only users with bad passwords are impacted, and because of this, it only impacts a fraction of the users instead of all of the users. This will drive down IT Help desk costs.
  • Users experience less "security fatigue" and happy end users make for a happier work environment for the IT staff.
  • Without having to remember a new passwords every 60-90 days, users will pick longer, more complex and more secure passwords. Better security overall.

  • For more information about tools that can help, visit the Enzoic website.



    About the Author

    Mike Wilson

    Mike Wilson

    Founder & CTO, Enzoic

    Mike C Wilson is the Founder and CTO of Enzoic (formerly PasswordPing), an innovative cyber-security startup that helps enterprises screen for compromised credentials during authentication and in Active Directory. Mike has spent 20 years in software development, with 12 years specifically in the information security space. At Webroot, Mike led the development of Spy Sweeper, Webroot's industry-leading anti-spyware product, and later the development of Webroot's first mobile security product for smartphones. At LogicNow, he was Chief Scientist and again led the development of an anti-malware product, this time introducing enhanced antivirus and web filtering functionality to the Managed Service Provider (MSP) space. Mike started his career in the high-security environment at NASA, working on the mission control center redevelopment project. Mike also founded several successful startups and he has a BS in Computer Science and Aerospace Engineering from Texas A&M. Mike lives in beautiful Boulder, Colorado with his wife and pets.




    Around the Network

    Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.