Fortifying Password Security: A Comprehensive Guide to Password Length, MFA, Expiration, and Failed Logins

Fortifying Password Security: A Comprehensive Guide to Password Length, MFA, Expiration, and Failed Logins

Introduction

As an IT and Cybersecurity professional, I am frequently approached with questions regarding the impact of password length on the security of user accounts. Many individuals seek guidance on the recommended minimum length for passwords to ensure adequate security, as well as the relationship between password complexity and length. Another common inquiry pertains to how increasing password length affects the time required to change it. Effectively managing passwords is crucial for safeguarding sensitive information and maintaining data integrity in today's digital landscape. To address these concerns, I embarked on a mission to locate a comprehensive table that correlates four key elements: Password Length, Multi-Factor Authentication (MFA) Enabled, Expiration Interval, and Failed Password Attempts. Unable to find an existing resource that fulfilled this need, I took the initiative to create a valuable matrix table. This go-to reference empowers individuals and organizations to make informed decisions, optimize their password security measures, and enhance their security posture. The study by Pamnani et al. (2023) provides insights into the minimum password length in Windows security, while the guidelines by Grassi et al. (2020) focus on digital identity authentication and lifecycle management. By considering these interconnected factors, organizations can effectively mitigate the risks associated with unauthorized access and data breaches. With this comprehensive tool at your disposal, you can confidently navigate the complexities of password management and establish a strong foundation for a secure digital environment.

No alt text provided for this image

 Password Lengths

Why is the length of a password crucial for ensuring the security of user accounts and systems? The length of a password holds immense importance in ensuring the security of user accounts and systems. A longer password directly influences its complexity and entropy, which measures its level of randomness. This complexity becomes a formidable obstacle for hackers attempting brute force attacks, making guessing or cracking passwords incredibly challenging. By increasing the length of a password, we expand the search space, creating a vast number of potential combinations. As a result, the time and computational resources required to guess the correct password increase exponentially.

To illustrate the significance of password length in thwarting brute-force attacks, let's delve into an example. Imagine a password comprising a mix of lowercase letters, uppercase letters, numbers, and special characters, totaling 94 possible characters. Now, let's assume that an attacker possesses a robust system capable of attempting 10 billion password guesses per second.

To simplify matters, let's explore the time it would take to crack passwords of different lengths using brute force, assuming the attacker has no prior knowledge of the password:

  • A 6-character password: With 94^6 (689,869,781,056) possible combinations, it would take approximately 68 seconds to crack the password at a rate of 10 billion guesses per second.
  • A 10-character password: With 94^10 (5,425,786,080,198,591,639,296) possible combinations, it would take approximately 5.4 million years to crack the password at a rate of 10 billion guesses per second.
  • A 12-character password: With 94^12 (5.85 x 10^22) possible combinations, it would take approximately 1.85 trillion years to crack the password at a rate of 10 billion guesses per second.

These calculations vividly demonstrate the exponential increase in cracking time as the password length grows. By implementing longer passwords, organizations can significantly enhance the security of user accounts and effectively mitigate the risk of brute-force attacks.

           However, it's important to note that these calculations are based on the assumption of a brute force attack, where the attacker systematically tries every possible combination. In reality, attackers often employ more sophisticated methods, such as dictionary attacks or leveraging stolen password databases. Therefore, it is advisable to complement a longer password length with other security measures like complexity requirements, multi-factor authentication (MFA), and regular password updates to create a robust defense against potential threats.

Remember, in the realm of passwords, length truly matters. So, let us embrace the power of long and formidable passwords to safeguard our digital domains from the clutches of malicious intruders.

No alt text provided for this image

Password Change Frequency 

  What is the optimal frequency for changing passwords in organizations? The frequency of password changes in organizations can vary based on factors such as industry regulations, company policies, and specific security requirements. While the traditional practice was to enforce periodic password expiration, typically every 30, 60, or 90 days, recent research and real-world data show that regular password changes may not necessarily enhance security.

Leading organizations like Microsoft and NIST have recognized frequent password change limitations and revised their recommendations accordingly. Instead, they emphasize a more effective and user-centric approach to password security. Key elements of this approach include:

  1. Strong and unique passwords: Encourage the use of strong, complex, and unique passwords or passphrases for each account to reduce the risk of guessing or brute-force attacks.
  2. Multi-factor authentication (MFA): Implement MFA, which adds an extra layer of security by requiring additional verification alongside passwords, such as fingerprint scans, SMS codes, or authenticator apps.
  3. Monitoring for compromised passwords: Deploy password monitoring solutions to identify compromised credentials and prompt users to change their passwords if necessary.
  4. User education and awareness: Provide guidance and training on creating strong passwords, recognizing phishing attempts, and adopting good password hygiene practices.

By prioritizing these measures, organizations can enhance password security without relying solely on frequent password changes. This approach recognizes the importance of strong authentication and user education in maintaining robust security.

It's worth noting that this shift is based on extensive research, real-world data breaches, and an understanding of human behavior. The aim is to strike a balance between security and usability while minimizing unnecessary burdens on users.

No alt text provided for this image

 From Passwords to Passphrases: A Security and Cultural Shift 

Are passwords alone enough to protect our sensitive information in today's cyber landscape? Passwords alone are no longer sufficient to protect our digital lives in the face of evolving cyber threats. The alarming increase in data breaches and the growing sophistication of hackers have exposed the vulnerabilities of password-based authentication. It's high time we explore alternative authentication methods that offer stronger security and better safeguard our sensitive information.

In this era of heightened security concerns, it's crucial to prioritize robust authentication mechanisms like multi-factor authentication (MFA) and biometrics. Major industry players, including Microsoft, Google, Apple and the National Institute of Standards and Technology (NIST), have recognized the limitations of periodic password expiration policies and have revised their recommendations accordingly (Grassi et al., 2020; Jakkal, 2023a; Srinivas, 2022; (O'Sullivan, 2022). They now emphasize the significance of selecting strong initial passwords, utilizing MFA, and continuously monitoring suspicious activities.

One practical approach gaining traction is using password phrases, also known as passphrases. Passphrases are memorable combinations of words or phrases that offer increased security compared to traditional passwords. By utilizing a longer and more complex sequence of words, passphrases provide an extra layer of protection against dictionary attacks and brute force cracking attempts. For example, a passphrase like "CorrectHorseBatteryStaple" is exponentially more secure than a shorter, complex password like "x#9P$Jm!."

Avoiding common phrases, personal information, or sequential patterns is essential to ensure optimal security. Strengthening the passphrase with a mix of uppercase and lowercase letters, numbers, and special characters further enhances its complexity. The length and complexity can be tailored to meet the specific requirements of the system or service.

By adopting strong and unique passphrases, you can significantly enhance the security of your accounts. Consider the recommendations from industry experts like Microsoft, Google, and NIST, and customize them to your organization's specific needs and security requirements. This proactive approach will bolster your overall password security, mitigate the risks of unauthorized access and data breaches, and foster a more secure digital environment.

No alt text provided for this image

The Correlation Table: Enhancing Password Security Measures

 In today's dynamic threat landscape, organizations need to analyze factors that impact password security to optimize their measures. Creating a correlation table that relates Password Length, MFA Enabled, Expiration Interval, and Failed Password Attempts can provide valuable insights to strengthen password security.

While organizations may have specific tables for their context, a universally standardized correlation table has been limited due to various security policies, evolving standards, and organization-specific considerations. However, conducting internal assessments and risk analyses enables organizations to develop a tailored approach that maximizes password security while considering user convenience, regulatory requirements, security threats, and industry best practices.

To assist organizations, I have created a correlation table as a starting point for analyzing the relationship between Password Length, MFA Enabled, Expiration Interval, and Failed Password Attempts. This table provides valuable insights into the impact of these factors on password security policies and helps design effective strategies.

Moreover, the introduction of this correlation table offers additional benefits beyond organizations. Insurance, audit, and compliance companies can leverage this table as a reference point to assess their clients' adherence to best practices. By utilizing the correlation table, these entities can evaluate the alignment of their clients' password security measures with industry recommendations and identify areas for improvement or adjustment. This fosters a standardized evaluation process, enhancing overall security practices.

No alt text provided for this image
Figure 1: EXB Password Length Security Correlation Matrix: Created by Edward Bezerra

Please note that this correlation table is a starting point and can be adjusted based on an organization's specific security policies, requirements, and risk assessments. It provides valuable insights into the relationship between password length, MFA enabled, expiration intervals, and failed password attempts, empowering organizations to design robust and effective password security strategies. Organizations should customize these values based on their specific security policies and requirements and align with risk tolerance, industry best practices, and regulatory requirements.

In this table, the expiration intervals have been carefully balanced to ensure security and user convenience. Failed password attempts have also been considered, implementing a threshold of 3 attempts for shorter passwords and 5 attempts for longer passwords. However, organizations should adjust these values based on their specific security requirements and risk assessments.

NOTE Setting the number of failed authentication attempts is an organization's personal preference. The National Institute of Standards and Technology (NIST) provides recommendations that can vary depending on the system, suggesting a range of 5-100 failed attempts (Grassi et al., 2020). Microsoft, on the other hand, recommends a specific threshold of 10 failed attempts (Jakkal, 2023a). It's important to note that cybersecurity experts have differing opinions on this matter, with recommendations ranging from 3 to 10 failed attempts (Pamnani et al., 2023). The choice of the number of failed authentication attempts should be made based on an organization's specific security requirements, risk assessments, and industry best practices.

References

 

Grassi, P., Newton, E., Fenton, J., Perlner, R., Regenscheid, A., Burr, W., Richer, J., Lefkovitz, N., Danker, J., Choong, Y.-Y., Greene, K., & Theofanos, M. (2020, March 2). Digital Identity Guidelines: Authentication and lifecycle management. NIST. https://csrc.nist.gov/publications/detail/sp/800-63b/final

IRS. (2021). Tax information security guidelines - internal revenue service. IRS Publication 1075 (Rev. 11). https://www.irs.gov/pub/irs-pdf/p1075.pdf  

Jakkal, V. (2023a, May 16). The passwordless future with Microsoft. Microsoft Security Blog. https://www.microsoft.com/en-us/security/blog/2021/09/15/the-passwordless-future-is-here-for-your-microsoft-account/

Pamnani, V., Paolo Matarazzo, P. M., Czechowski, A., & Long, L. (2023, February 16). Minimum password length - windows security. Windows Security | Microsoft Learn. https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/minimum-password-length

Srinivas, S. (2022, May 5). One step closer to a passwordless future. Google. https://blog.google/technology/safety-security/one-step-closer-to-a-passwordless-future/  

O’Sullivan, I. (2022, June 10). Apple announces decision to ditch passwords. Tech.co. https://tech.co/news/apple-ditches-passwords

To view or add a comment, sign in

More articles by Edward Bezerra, DCS

Others also viewed

Explore content categories