Resources / Security Policy Templates / Password Security

password security policy template

Sample Password Security Policy Template

 

Learn how PurpleSec’s experts can help develop your organization’s cyber security policies.

Author: Rich Selvidge, CISSP / Last Updated: 01/02/22

Reviewed ByMichael Swanagan, CISSP, CISA, CISM

View OurEditorial Process

Overview

 

Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of {COMPANY-NAME}’s entire corporate network.

 

As such, all {COMPANY-NAME} employees or volunteers/directors (including contractors and vendors with access to {COMPANY-NAME} systems) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.

Download Template

cyber security policy templates for 2023

Purpose

 

The purpose of the password security policy is to establish a standard for the creation of strong passwords, the protection of those passwords, and the frequency of change.

Audience

 

This policy applies to all personnel or volunteers/directors who have, or are responsible for, an account (or any form of access that supports or requires a password) on any system that resides at any {COMPANY-NAME} facility, has access to the {COMPANY-NAME} network, or stores any non-public {COMPANY-NAME} information.

Policy Detail

User Network Passwords

 

Passwords for {COMPANY-NAME} network access must be implemented according to the following guidelines:

 

  • Passwords must be changed every 90 days
  • Passwords must adhere to a minimum length of 10 characters
  • Passwords must contain a combination of alpha, numeric, and special characters, where the computing system permits (!@#$%^&*_+=?/~’;’,<>|\)
  • Passwords must not be easily tied back to the account owner such as:
    • Username, social security number, nickname, relative’s names, birth date, etc.
  • Passwords must not be dictionary words or acronyms
  • Passwords cannot be reused for 1 year

System-Level Passwords

 

  • All system-level passwords must adhere to the following guidelines:
    • Passwords must be changed at least every 6 months
    • All administrator accounts must have 12 character passwords which must contain three of the four items: upper case, lower case, numbers, and special characters.
    • Non-expiring passwords must be documented listing the requirements for those accounts. These accounts need to adhere to the same standards as administrator accounts
    • Administrators must not circumvent the Password Policy for the sake of ease of use

Password Protection

 

  • The same password must not be used for multiple accounts.
  • Passwords must not be shared with anyone. All passwords are to be treated as sensitive, confidential {COMPANY-NAME} information.
  • Stored passwords must be encrypted.
  • Passwords must not be inserted in e-mail messages or other forms of electronic communication.
  • Passwords must not be revealed over the phone to anyone.
  • Passwords must not be revealed on questionnaires or security forms.
  • Users must not hint at the format of a password (for example, “my family name”).
  • {COMPANY-NAME} passwords must not be shared with anyone, including co-workers, managers, or family members, while on vacation.
  • Passwords must not be written down and stored anywhere in any office. Passwords must not be stored in a file on a computer system or mobile device (phone, tablet) without encryption.
  • If the security of an account is in question, the password must be changed immediately. In the event passwords are found or discovered, the following steps must be taken:
    • Take control of the passwords and protect them
    • Report the discovery to IT
  • Users cannot circumvent password entry with an auto logon, application remembering, embedded scripts, or hard coded passwords in client software. Exceptions may be made for specific applications (like automated backup processes) with the approval of IT. For an exception to be approved, there must be a procedure to change the passwords.
  • PCs must not be left unattended without enabling a password-protected screensaver or logging off the device.
  • If the security of an account is in question, the password must be changed immediately. In the event passwords are found or discovered, the following steps must be taken:
    • Take control of the passwords and protect them
    • Report the discovery to IT
  • Security tokens (i.e. smartcards, RSA hardware tokens, etc.) must be returned upon demand or upon termination of the relationship with {COMPANY-NAME}.

Application Development Standards

 

Application developers must ensure their programs follow security precautions in this policy and industry standards.

security policy writing services cta

Richard Selvidge, CISSP, ITIL - Cyber Security Expert

Rich Selvidge

Rich Selvidge is the Chief Information Security Officer at PurpleSec, providing singular accountability for all information security controls in the company. He brings over 21 years of information technology and security risk management experience.

Explore Our Security Services

managed it security services - purplesec

Managed Security

Learn More >

penetration testing services - purplesec

Penetration Testing

Learn More >

vulnerability patch management services - purplesec

Vulnerability Mgmt

Learn More >

security gap assessment services - purplesec

Risk Assessment

Learn More >