<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NIST new ruling on passwords in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/1199#M120</link>
    <description>&lt;P&gt;I see this as a first great step in the direction of "when security becomes too restrictive, it may cause worse or even more unsecure issues to arise". &amp;nbsp;For example, when requireing a individual to change a complex password &amp;nbsp;every 60-90 days (ex. must have 1 of each character type not to have more than two of the same....) it causes a situation where not only the person many time only replaces or adds the next characther (ex. Scott@1 to Scott@2 or Scott@12 then Scott&amp;nbsp;@123) but many times will end up writing it down either in a file or a notebook somewhere. &amp;nbsp;Although many may encrypt the written password change somewhere, majority will not.&lt;/P&gt;</description>
    <pubDate>Thu, 12 Oct 2017 01:53:44 GMT</pubDate>
    <dc:creator>sapounas</dc:creator>
    <dc:date>2017-10-12T01:53:44Z</dc:date>
    <item>
      <title>NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/393#M20</link>
      <description>&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;I wanted to see how members on here felt about NIST new draft of password policy suggestion. &amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&lt;STRONG&gt;What’s new ?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;What are the major differences between current received wisdom about “secure passwords” and what NIST is now recommending?&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Some of the recommendations you can probably guess; others may surprise you.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;We’ll start with the things you should do.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Favor the user.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;To begin with, make your password policies&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&lt;I&gt;user friendly&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;and put the&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&lt;I&gt;burden on the verifier&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;when possible.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;In other words, we need to stop asking users to do things that aren’t actually improving security.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Much research has gone into the efficacy of many of our so-called “best practices” and it turns out they don’t help enough to be worth the pain they cause.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Size matters.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;At least it does when it comes to passwords. NIST’s new guidelines say you need a minimum of 8 characters. (That’s not a maximum minimum – you can increase the minimum password length for more sensitive accounts.)&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Better yet, NIST says you should allow a maximum length of at least 64, so no more “Sorry, your password can’t be longer than 16 characters.”&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Applications must allow all printable ASCII characters, including spaces, and should accept all UNICODE characters, too, including emoji!&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;This is great advice, and considering that passwords must be hashed and salted when stored (which converts them to a fixed-length representation) there shouldn’t be unnecessary restrictions on length.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;We often advise people to use passphrases, so they should be allowed to use all common punctuation characters and any language to improve usability and increase variety.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Check new passwords against a dictionary of known-bad choices.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;You don’t want to let people use&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#c7254e"&gt;&lt;FONT face="Menlo, Monaco, Consolas, Courier New, monospace"&gt;ChangeMe&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;,&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#c7254e"&gt;&lt;FONT face="Menlo, Monaco, Consolas, Courier New, monospace"&gt;thisisapassword&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;,&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#c7254e"&gt;&lt;FONT face="Menlo, Monaco, Consolas, Courier New, monospace"&gt;yankees&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;, and so on.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;More research needs to be done into how to choose and use your “banned list,” but Jim Fenton thinks that 100,000 entries is a good starting point.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&lt;STRONG&gt;The don’ts&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Now for all the things you shouldn’t do.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;No composition rules.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;What this means is, no more rules that force you to use particular characters or combinations, like those daunting conditions on some password reset pages that say, “Your password must contain one lowercase letter, one uppercase letter, one number, four symbols but not&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#c7254e"&gt;&lt;FONT face="Menlo, Monaco, Consolas, Courier New, monospace"&gt;&amp;amp;%#@_&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;, and the surname of at least one astronaut.”&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Let people choose freely, and encourage longer phrases instead of hard-to-remember passwords or illusory complexity such as&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#c7254e"&gt;&lt;FONT face="Menlo, Monaco, Consolas, Courier New, monospace"&gt;pA55w+rd&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;No password hints.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;None. If I wanted people have a better chance at guessing my password, I’d write it on a note attached to my screen.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;People set password hints like&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://nakedsecurity.sophos.com/2013/11/04/anatomy-of-a-password-disaster-adobes-giant-sized-cryptographic-blunder/" target="_blank"&gt;&lt;FONT color="#006f53"&gt;&lt;FONT face="Menlo, Monaco, Consolas, Courier New, monospace"&gt;&lt;U&gt;rhymes with assword&lt;/U&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;when you allow hints. (Really! We have some&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;A href="https://nakedsecurity.sophos.com/2013/11/04/anatomy-of-a-password-disaster-adobes-giant-sized-cryptographic-blunder/" target="_blank"&gt;&lt;SPAN&gt;&lt;FONT color="#006f53"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&lt;U&gt;astonishing examples&lt;/U&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;from Adobe’s 2013 password breach.)&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;Knowledge-based authentication (KBA) is out.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;KBA is when a site says, “Pick from a list of questions – Where did you attend high school? What’s your favourite football team? – and tell us the answer in case we ever need to check that it’s you.”&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;No more expiration without reason.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&amp;nbsp;This is my favourite piece of advice: If we want users to comply and choose long, hard-to-guess passwords, we shouldn’t make them change those passwords unnecessarily.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;The only time passwords should be reset is when they are forgotten, if they have been phished, or if you think (or know) that your password database has been stolen and could therefore be subjected to an offline brute-force attack.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&lt;STRONG&gt;There’s more…&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;NIST also provides some other very worthwhile advice.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;All passwords must be hashed, salted and stretched, as we explain in our article&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://nakedsecurity.sophos.com/2013/11/20/serious-security-how-to-store-your-users-passwords-safely/" target="_blank"&gt;&lt;SPAN&gt;&lt;FONT color="#006f53"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&lt;U&gt;How to store your users’ password safely&lt;/U&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;FONT color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;You need a salt of 32 bits or more, a keyed HMAC hash using SHA-1, SHA-2 or SHA-3, and the “stretching” algorithm PBKDF2 with at least 10,000 iterations.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;&lt;A href="https://nakedsecurity.sophos.com/2016/08/18/nists-new-password-rules-what-you-need-to-know/" target="_blank"&gt;https://nakedsecurity.sophos.com/2016/08/18/nists-new-password-rules-what-you-need-to-know/&lt;/A&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;I think this is a great step. &amp;nbsp;The 90 day rotation only made users change the base of their password append with a date or numerical number. &amp;nbsp;Example, TH!S1sMYp2ssw0rd1, THIS1sMYp2ssw0rd2, etc. &amp;nbsp; &amp;nbsp;Once the base of the password was figured out or phished, gaining access is easier. &amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;I still educate my users on passphrases and why they better as a password substitute but our policy (and compliance) rules make it hard to use a nice passphrase. &amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3" color="#424a54"&gt;&lt;FONT face="Open Sans, Arial, sans-serif"&gt;I have also educated my users on password management solutions. &amp;nbsp;This allows for a long passphrase as the master password that bypasses local policy restrictions. &amp;nbsp;Local solutions work well if you have an office that you will always log into at work. &amp;nbsp;The database for this solution should be stored on a network share for data redundancy. &amp;nbsp; Also, Cloud solutions are acceptable if you have a user who is on the move or never logs in from the same device. &amp;nbsp; I would only caution that your Cloud solution encrypts the data and either you hold the decrypt key or have it part of your master password. &amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Thoughts?&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 15:07:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/393#M20</guid>
      <dc:creator>Matthew</dc:creator>
      <dc:date>2017-10-08T15:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/421#M22</link>
      <description>&lt;P&gt;I'm interested, too. I'm anxious to see when auditors/assessors/frameworks (PCI, SOC, HITRUST, etc.) adopt this guidance, because until then there's nothing an organization can do in the face of an audit looking to check a box.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 15:30:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/421#M22</guid>
      <dc:creator>kesmit</dc:creator>
      <dc:date>2017-10-08T15:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/461#M23</link>
      <description>&lt;P&gt;I'll be curious how many people take this advice, especially the new thoughts around not having passwords expire routinely.&amp;nbsp; We've already been hit by some of our saavy tech users asking when we were going to change our standards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone else been asked about this by their user base?&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 15:53:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/461#M23</guid>
      <dc:creator>asebastian</dc:creator>
      <dc:date>2017-10-08T15:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/470#M24</link>
      <description>&lt;P&gt;While 8 is fine for non priviliged accounts for anything more interesting longer should be used.&lt;/P&gt;&lt;P&gt;Moving away from the frequent changes is good imo, make stronger, better selections and force changes when you have reason to not just every 30 days etc.&lt;/P&gt;&lt;P&gt;SHA1 though...&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 16:04:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/470#M24</guid>
      <dc:creator>JJP</dc:creator>
      <dc:date>2017-10-08T16:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/480#M26</link>
      <description>&lt;P&gt;I'm still a fan of physical item 2FA over username/password.&amp;nbsp;&amp;nbsp;In my experiance, people hold on to a physical item&amp;nbsp;more successfully&amp;nbsp;than a&amp;nbsp;mental word picture.&amp;nbsp; I look forward to this&amp;nbsp;NIST update implemetation throughout the government,&amp;nbsp;even if it takes ten years and a few more breaches to move them into action.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 16:10:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/480#M26</guid>
      <dc:creator>Keith</dc:creator>
      <dc:date>2017-10-08T16:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/489#M28</link>
      <description>&lt;P&gt;I got rid of password aging seven years ago. I have been telling auditors I don't make passwords expire because doing so decreases security. It's good to see NIST coming out with advice that passwords should not be changed every 90 days and that longer is better. For Active Directory, I have a 16 character minimum. Training staff to use long passphrases in English without special characters that they can easily remember reduces service desk calls for password assistance.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 16:28:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/489#M28</guid>
      <dc:creator>n5rmj</dc:creator>
      <dc:date>2017-10-08T16:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/551#M31</link>
      <description>&lt;P&gt;I remember a conversation i had 2 years ago when I suggested the new password/passphrase paradigm. The first answer was: "We would have to admit we were wrong in the past" and it took some time to convince.&lt;/P&gt;&lt;P&gt;I'm glad those kind of discussions will&amp;nbsp;be much easier soon &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 18:04:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/551#M31</guid>
      <dc:creator>malte-wirz</dc:creator>
      <dc:date>2017-10-08T18:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/607#M36</link>
      <description>&lt;P&gt;Most strongly, I agree with the disposal off password aging, and&amp;nbsp;I'd like to see increased&amp;nbsp;socializing/teaching&amp;nbsp;of passphrasing concepts. Many people still don't understand what exactly we mean by passphrase. Also, two factor auth could/should be used more often especially where money/credit cards are involved.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 19:55:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/607#M36</guid>
      <dc:creator>Kelly</dc:creator>
      <dc:date>2017-10-08T19:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/619#M37</link>
      <description>&lt;P&gt;Hmmmm...lots to chew on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;8 character passwords - however complex they are, if you hash them with MD5 or SHA1 they are vulnerable to modest amounts of Amazon GPU.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I like the idea of non-changing passwords, but I'm having problems persuading the sysadmin at my company (who says he sees weak passwords) that this is actually a good way of stopping those weak passwords recurring.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There's also the small question of whether NIST's guidance is compatible (say) with ISO27001. I think it is - but any firmer evidence is welcome.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 20:10:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/619#M37</guid>
      <dc:creator>JamesMac</dc:creator>
      <dc:date>2017-10-08T20:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/637#M41</link>
      <description>&lt;P&gt;When I used to do security awareness sessions, I used to suggest (to make people think) that a password like "aaaaaaaaaaaaaaaaaaaaa" was more secure than "83$kKz".&amp;nbsp; &amp;nbsp; I'm not a mathematician, but I think it can be proved that a passphrase, even one with all alpha lower-case characters, is more secure than a short, so-called "complex" password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 20:59:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/637#M41</guid>
      <dc:creator>DHerrmann</dc:creator>
      <dc:date>2017-10-08T20:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/649#M44</link>
      <description>&lt;P&gt;For those comfortable with the use of a password safe you can still go overboard on the&amp;nbsp;mixing of characters and use as long as possibile a password as you can. (I still intend to)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The new reccomendations are improvements without any real drawbacks imo.. It helps those who just&amp;nbsp;can't or won't use safes to come up with personalised and secure passwords a lot&amp;nbsp;easier than the previous reccomendations did.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 21:39:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/649#M44</guid>
      <dc:creator>Metalrat</dc:creator>
      <dc:date>2017-10-08T21:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/652#M45</link>
      <description>&lt;P&gt;With all these changes happening I see one thing staying the same...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Passwords written on sticky notes, attached to the bottom of a keyboard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although the NIST is making recommendations concerning&amp;nbsp;password complexity and negating password expiration (etc.), they will never be able to change the most influencial factor to password security;&lt;EM&gt; human behavior.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I.T. security always has been and always will be under threat, a threat that can only be mitigated never resolved by people in our profession.&amp;nbsp; I look forward to the challenge.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 21:46:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/652#M45</guid>
      <dc:creator>Jen</dc:creator>
      <dc:date>2017-10-08T21:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/661#M49</link>
      <description>&lt;P&gt;No matter how much we talk about changing passwords, or min/max lengths, or using passphrases instead of passwords, etc., without enabling multifactor authentication, passwords will always be weak.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We need to enforce MFA more than password security in my opinion...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 22:59:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/661#M49</guid>
      <dc:creator>RaymondFrangie</dc:creator>
      <dc:date>2017-10-08T22:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/736#M54</link>
      <description>&lt;P&gt;I am actually in favor of password (or passphrase) expiring. We have seen tons of breaches over the years and I do not think that would change in a near future. There are really bunch of teenagers who tries these leaked passwords. Many of them have the motive to decrypt or guess it from the password hint questions. If you do not change your password periodically, your leaked password in a 2013 breach can possibly still usable. Password expiry is something that is helpful for system admins to force users to have a better security awareness (not security, but awareness). If users feel that they are part of your security framework, it would be very beneficiary for both ends (as long as you are not storing confidential data unencrypted.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PCI and other industry-accepted global standards always mention NIST as a baseline, so even if NIST is a national standard, it has a global perspective also. So, you can think that password expiry was something that is old-fashioned, or diminishes security overall, but you must also think of everyone else who does not have a security knowledge as you. This does not mean that you should stop thinking of any progress.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I strongly agree that if the period of changing passwords is too close, the passwords become SecurePass1, SecurePass2, and so on. It is definitely guessable. But there are some people mentioning "teaching". Maybe at your lessons, you could say this is wrong, and tell them clever passphrases are much better - long enough to be secure and easy to remember: LeavesFALLin09 (as in September), ThisGonnaBeACold10 (as October), RememberTheFifthof11! (November)...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It would be very nice to be user-friendly and have the verifier to be strong as possible, but as the previous replies mentioned, you must have a second factor (multi-factor or multi-step) to protect your identity. All passwords (or passphrases) can be bruteforced, it is just a matter of time.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 07:34:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/736#M54</guid>
      <dc:creator>obenkuyucu</dc:creator>
      <dc:date>2017-10-09T07:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/766#M58</link>
      <description>&lt;P&gt;The new guidelines from NIST are a great step forward.&amp;nbsp; Is there any guidance with regard to good passphrases and two factor authentication?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 08:57:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/766#M58</guid>
      <dc:creator>Richard_B</dc:creator>
      <dc:date>2017-10-09T08:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/786#M59</link>
      <description>&lt;P&gt;It's all a bit ironic that I've just been forced to change my ISC2 password to include all four character sets. If we're going to use our ISC2 credentials to show that we are at the cutting edge of Information Security, our industry body should be a little more forward-thinking.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 10:44:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/786#M59</guid>
      <dc:creator>PaulS</dc:creator>
      <dc:date>2017-10-09T10:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/852#M62</link>
      <description>&lt;P&gt;If the method can ever be standardized, Gibson's SQRL looks promising as a means to solve the issue of longer passwords written under keyboards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.grc.com/sqrl/sqrl.htm" target="_blank"&gt;https://www.grc.com/sqrl/sqrl.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 14:14:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/852#M62</guid>
      <dc:creator>noel</dc:creator>
      <dc:date>2017-10-09T14:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/889#M63</link>
      <description>&lt;P&gt;It's about time this was addressed.&amp;nbsp; The one of this, two of that, no repeat and no characters next to each other leads to more time spent with the identity managers changing passwords and caused user outages at the worst times.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read an article a couple of years ago so I can't confirm it, but I believe the guy that invented the basis for the current craziness says he wishes he had never written that article.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Random words placed in a way so you can make a passphrase in your head with them has much more entropy and true randomness than any of the previous password requirements.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 15:33:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/889#M63</guid>
      <dc:creator>knowcomputers</dc:creator>
      <dc:date>2017-10-09T15:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/895#M64</link>
      <description>&lt;P&gt;From and OS or application perspective, these passwords would be a challenge and I expect a lot of time to account for these variations.&amp;nbsp; Keeping to 16 Char has set many DB tables and I would expect these to have to be rebuilt.&amp;nbsp; It is not just a OS fixing the hash sizes, it is a matter of fixing the applications/ middleware and then the OS to enforce.&amp;nbsp; I think the concept is a great idea.&amp;nbsp; The No password hint is even better..&amp;nbsp; just reset your pw.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 15:43:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/895#M64</guid>
      <dc:creator>itmurph07</dc:creator>
      <dc:date>2017-10-09T15:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: NIST new ruling on passwords</title>
      <link>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/933#M68</link>
      <description>&lt;P&gt;"When" this happens... I'll be doing the happy dance. I recently had to create a password that couldn't include any dictionary word combinations. This started with two characters, so even the inclusion of "oN" as part of the password resulted in an unacceptable password. Using a passphrase I can remember without the arbitrary need for special characters and numbers will definitely be a move in the right direction.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 17:22:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/NIST-new-ruling-on-passwords/m-p/933#M68</guid>
      <dc:creator>ElectricSmile</dc:creator>
      <dc:date>2017-10-09T17:22:31Z</dc:date>
    </item>
  </channel>
</rss>

