{"id":90930,"date":"2019-06-09T12:25:01","date_gmt":"2019-06-09T16:25:01","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-01-13T17:08:08","modified_gmt":"2022-01-13T22:08:08","slug":"password-reset-practices-obsolete","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/password-reset-practices-obsolete\/","title":{"rendered":"Password Reset Practices &#8220;Obsolete&#8221;"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20230323182808\/https:\/\/labs.eleks.com\/2014\/04\/strong-unique-and-memorable-passwords-a-creative-approach.html\" target=\"_blank\" rel=\"&quot;obsolete&quot; password practices reset noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-92081\" title=\"Password Reset Practices &quot;Obsolete&quot; \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/password-sticker-1.jpg?resize=82%2C75&#038;ssl=1\" alt=\"Password Reset Practices &quot;Obsolete&quot; \" width=\"82\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/password-sticker-1.jpg?resize=150%2C138&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/password-sticker-1.jpg?resize=75%2C69&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/password-sticker-1.jpg?w=305&amp;ssl=1 305w\" sizes=\"auto, (max-width: 82px) 100vw, 82px\" \/><\/a>Followers of the <em><a href=\"http:\/\/www.rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a><\/em> know that <a href=\"https:\/\/rbach.net\/?s=passwords\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>passwords suck<\/strong><\/a>. And now <strong><a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a><\/strong> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) has joined me in that revelation. The boys in Redmond recently recommended that organizations <strong>no longer force employees to change their password every 60 days<\/strong>.<\/p>\n<p><a href=\"http:\/\/www.microsfot.com\" target=\"_blank\" rel=\"microsoft logo noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92082 \" title=\"Microsoft logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/microsoft-logo.jpg?resize=114%2C41&#038;ssl=1\" alt=\"Microsoft logo\" width=\"114\" height=\"41\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/microsoft-logo.jpg?resize=150%2C54&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/microsoft-logo.jpg?resize=75%2C27&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/microsoft-logo.jpg?resize=768%2C275&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/microsoft-logo.jpg?w=795&amp;ssl=1 795w\" sizes=\"auto, (max-width: 114px) 100vw, 114px\" \/><\/a>In a<em> <a href=\"https:\/\/blogs.technet.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">TechNet<\/a><\/em> <a href=\"https:\/\/blogs.technet.microsoft.com\/secguide\/2019\/04\/24\/security-baseline-draft-for-windows-10-v1903-and-windows-server-v1903\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a> penned by <a href=\"https:\/\/social.technet.microsoft.com\/profile\/Aaron+Margosis\" target=\"_blank\" rel=\"noopener noreferrer\">Aaron Margosis<\/a>, a principal consultant for Microsoft, the company called the practice &#8211; once a cornerstone of enterprise identity management &#8211; &#8220;<strong><a href=\"https:\/\/rbach.net\/index.php\/worlds-first-computer-password-was-useless\/\" target=\"_blank\" rel=\"noopener noreferrer\">ancient<\/a> and obsolete<\/strong>&#8221; as it told IT, administrators, that other approaches are much more effective in keeping users safe.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>Periodic password expiration is an ancient and obsolete mitigation of very low value, and we don&#8217;t believe it&#8217;s worthwhile for our baseline to enforce any specific valu<\/em>e<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/windows\" target=\"_blank\" rel=\"windows-10-logo noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92110\" title=\"Windows-10-logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/Windows-10-logo.png?resize=75%2C75&#038;ssl=1\" alt=\"Windows-10-logo\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/Windows-10-logo.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/Windows-10-logo.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/Windows-10-logo.png?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>In the latest <strong><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-baselines\" target=\"_blank\" rel=\"noopener noreferrer\">security configuration baseline<\/a> for Windows 10, <\/strong>which allows administrators to use Microsoft-recommended GPO baselines for improving the overall security posture of a system and reduce a Windows 10 machine&#8217;s attack surface, <strong>&#8220;May 2019 Update&#8221; (1903)<\/strong> &#8211; (<a href=\"https:\/\/web.archive.org\/web\/20190430154255\/https:\/\/msdnshared.blob.core.windows.net\/media\/2019\/04\/Windows-10-1903-Security-Baseline-DRAFT.zip\" target=\"_blank\" rel=\"noopener noreferrer\">available as a ZIP file for download here<\/a>) <strong>Microsoft dropped the idea that passwords should be frequently changed<\/strong>. Previous baselines had advised enterprises to mandate a password change every 60 days. (And that was down from an earlier 90 days.)<\/p>\n<p>Mr. Margosis acknowledged that policies to automatically expire passwords &#8211; and other <strong>group policies<\/strong> that set security standards &#8211; are often misguided. He wrote,<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>The small set of ancient password policies enforceable through Windows&#8217; security templates is not and cannot be a complete security strategy for user credential management &#8230; Better practices, however, cannot be expressed by a set value in a group policy and coded into a template.<\/em><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92111\" title=\"Multi-factor authentication\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/2fa.png?resize=108%2C62&#038;ssl=1\" alt=\"Multi-factor authentication\" width=\"108\" height=\"62\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/2fa.png?resize=150%2C86&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/2fa.png?resize=75%2C43&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/2fa.png?w=602&amp;ssl=1 602w\" sizes=\"auto, (max-width: 108px) 100vw, 108px\" \/>Among those other, <strong>better practices<\/strong>, Mr. Margosis mentioned <a href=\"https:\/\/rbach.net\/index.php\/who-needs-two-factor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>multi-factor authentication<\/strong><\/a> &#8211; also known as two-factor authentication &#8211; and <strong>banning weak<\/strong>, vulnerable, easily guessed, or <a href=\"https:\/\/rbach.net\/index.php\/worst-passwords-2017\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>frequently revealed<\/strong><\/a> <strong>passwords<\/strong>.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>ComputerWorld<\/em><\/a> <a href=\"https:\/\/www.computerworld.com\/article\/3391365\/microsoft-tells-it-admins-to-nix-obsolete-password-reset-practice.html\" target=\"_blank\" rel=\"noopener noreferrer\">points out<\/a> that Microsoft is not the first to doubt the convention. The <strong>National Institute of Standards and Technology<\/strong> (<a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">NIST<\/a>) made similar arguments as it downgraded regular password replacement. &#8220;<em>Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically)<\/em>,&#8221; NIST said in a FAQ that accompanied the <strong>June 2017<\/strong> version of <a href=\"https:\/\/web.archive.org\/web\/20210407231613\/https:\/\/www.nist.gov\/itl\/tig\/projects\/special-publication-800-63\" target=\"_blank\" rel=\"noopener noreferrer\">SP 800-63<\/a>, &#8220;<strong>Digital Identity Guidelines<\/strong>,&#8221; using the term &#8220;memorized secrets&#8221; in place of &#8220;passwords.&#8221;<\/p>\n<p>Then, the institute had explained why mandated password changes were a bad idea this way:<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>Users tend to choose weaker memorized secrets when they know that they will have to change them in the near future. When those changes do occur, they often select a secret that is similar to their old memorized secret by applying a set of common transformations such as increasing a number in the password.<\/em><\/p>\n<p><a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"nist logo noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92112 \" title=\"NIST logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/nist_logo.gif?resize=138%2C70&#038;ssl=1\" alt=\"NIST logo\" width=\"138\" height=\"70\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/nist_logo.gif?resize=150%2C76&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/nist_logo.gif?resize=75%2C38&amp;ssl=1 75w\" sizes=\"auto, (max-width: 138px) 100vw, 138px\" \/><\/a>Both the NIST and Microsoft urged organizations to require password resets when there is evidence that the passwords had been stolen or otherwise compromised. And if they haven&#8217;t been touched? &#8220;<strong>If a password is never stolen, there&#8217;s no need to expire it,<\/strong>&#8221; Microsoft&#8217;s Margosis said.<\/p>\n<p>John Pescatore, the director of emerging security trends at the <a href=\"https:\/\/www.sans.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>SANS Institute<\/strong><\/a> told <em>ComputerWorld<\/em>;<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>I agree 100% with Microsoft&#8217;s logic for enterprises, which are who uses [group policies] anyway &#8230; Forcing every employee to change passwords at some arbitrary period almost invariably causes more vulnerabilities to appear in the password reset process (because there are now frequent spikes of users forgetting their passwords) which increases risk more than the forced password reset ever decreases it.<\/em><\/p>\n<p><a href=\"https:\/\/www.boldoutlaw.com\/puckrobin\/puckages.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92080 \" title=\"hobgoblins of little minds\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/Puck.jpg?resize=75%2C111&#038;ssl=1\" alt=\"hobgoblins of little minds\" width=\"75\" height=\"111\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/Puck.jpg?resize=101%2C150&amp;ssl=1 101w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/Puck.jpg?resize=50%2C75&amp;ssl=1 50w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2019\/06\/Puck.jpg?w=229&amp;ssl=1 229w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Like Microsoft and NIST, SAN&#8217;s Pescatore thought periodic password resets are the <a href=\"https:\/\/emersoncentral.com\/texts\/essays-first-series\/self-reliance\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>hobgoblins of little minds<\/strong><\/a>, &#8220;<em>Having [this] as part of the baseline makes it easier for security teams to claim compliance because auditors are happy,<\/em>&#8221; Pescatore told ComputerWorld. &#8220;<em>Focusing on password reset compliance was a huge part of all the money wasted on <strong>Sarbanes-Oxley audits<\/strong> 15 years ago. A great example of how <strong>compliance does not equal security<\/strong><\/em>.&#8221;<\/p>\n<p><em>ComputerWorld<\/em> notes other changes in the Windows 10 1903 draft baseline, Microsoft also dropped policies for the <strong>BitLocker<\/strong> drive encryption method and its cipher strength. The prior recommendation was to use the strongest available BitLocker encryption, but that, Microsoft said, was overkill: (&#8220;<em>Our crypto experts tell us that there is no known danger of [128-bit encryption] being broken in the foreseeable future,<\/em>&#8221; MSFT&#8217;s Margosis told <em>ComputerWorld<\/em>.) And it could easily <strong>degrade device performance<\/strong>.<\/p>\n<p>Microsoft is also looking for feedback on a proposed change that would <strong>drop the forced disabling of Windows&#8217; built-in Guest and Administrator accounts<\/strong>. Microsoft&#8217;s Margosis hedged a bit;<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>Removing these settings from the baseline would not mean that we recommend that these accounts be enabled, nor would removing these settings mean that the accounts will be enabled,&#8221;Removing the settings from the baselines would simply mean that administrators could now choose to enable these accounts as needed.<\/em><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>We have covered this before, forcing users to change passwords over short time-frames inevitably leads to users choosing the simplest, most memorable, and most crackable passwords possible. Things have changed over the years, including technology that now enables threat actors to crack simplistic passwords easily.<br \/>\n<\/em><\/p>\n<p><em>MSFT is now <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-forcing-multi-factor-authentication-on-azure-ad-admin-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">actively pushing MFA<\/a> in the enterprise so it is not surprising they are going away from this general password policy.<\/em><\/p>\n<p><em>MSFT changing its security baselines won&#8217;t change requirements made by regulatory authorities (PCI-DSS, HIPAA, SOX, NERC) and auditors. It takes years and years for them to change.<\/em><\/p>\n<p><em>The change does not affect home users &#8211; but maybe it will make them think?<\/em><\/p>\n<p><em>Slowly the world of passwords is starting to come under control.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/systems-administrators-you-need-to-know-about-this-windows-10-1903-patching-change\/\" target=\"_blank\" rel=\"noopener noreferrer\">Systems administrators: You need to know about this Windows 10 1903 patching change<\/a> (<a href=\"https:\/\/www.zdnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDnet<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>MSFT says it is no longer necessary to force employees to change their password every 60 days says it is ancient and obsolete mitigation of very low value<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2885,3276,3161,3275,3278,2925,824,1282,82,421,949,2541,2370,4,2009,445],"class_list":["post-90930","post","type-post","status-publish","format-standard","hentry","category-security","tag-2885","tag-3276","tag-3161","tag-800-63","tag-bitlocker","tag-compliance","tag-encryption","tag-hipaa","tag-microsoft","tag-msft","tag-nist","tag-passwords","tag-pci-dss","tag-security","tag-sox","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/90930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=90930"}],"version-history":[{"count":6,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/90930\/revisions"}],"predecessor-version":[{"id":118203,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/90930\/revisions\/118203"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=90930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=90930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=90930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}