Navigate NIST’s updated password rotation guidelines
The National Institute of Standards and Technology (NIST) recently updated its guidelines on password rotation, advising against the once standard practice of requiring users to change their passwords every 30, 60, or 90 days – unless an organization has experienced a data breach. This marks a significant shift from traditional cybersecurity policies that focused on preventing breaches through frequent password changes. However, NIST’s new position appears to be at odds with the real needs of organizations focused on reducing security risks.
Understanding password rotation
Password rotation refers to the practice of regularly changing passwords to minimize the risk of unauthorized access to sensitive information. There are two primary types of password rotation: manual and automatic.
Manual password rotation requires users to update their passwords at set intervals, while automatic password rotation relies on technology to generate and replace passwords without user intervention.
While manual password rotation is common, it often has the unintended effect of leading to weak passwords and user frustration. Automated password rotation, on the other hand, improves security by regularly generating strong and unique passwords without the user having to generate or remember them.
CEO and co-founder of Keeper Security.
NIST’s shift away from frequent manual rotation
NIST’s latest guidelines discourage enforcing mandatory password changes every 30, 60, or 90 days unless there is evidence of a breach. This change comes from the realization that frequent mandatory password updates can lead to poor user behavior, such as creating weak or easily guessable passwords for convenience.
For example, when users need to change passwords frequently, they only need to make minor adjustments to an old password (such as changing “Password1” to “Password2”), which weakens security and makes it easier for attackers to guess credentials using of techniques such as ‘credential stuffing’ or brutal attacks. force attacks. These passwords are also often reused across multiple accounts.
NIST’s updated guidance recognizes that the effectiveness of frequent password changes is limited unless there is specific evidence of compromised credentials. Instead of focusing on how often to change passwords, NIST is now emphasizing the use of strong passwords and Multi-Factor Authentication (MFA) as more effective means of improving security.
Why password rotation is still important
Despite NIST’s recommendation to reduce mandatory password rotation, it remains relevant in certain contexts – especially for privileged accounts that have access to sensitive systems and data. Password rotation can effectively limit exposure if credentials are compromised. Automated password rotation is essential because it:
- Prevents unauthorized access: Using the same password for a long time increases the risk that a cybercriminal will crack the password. Frequently changing passwords for sensitive accounts limits the time attackers have to exploit compromised credentials.
- Limits exposure time: Frequent password rotation reduces the time a stolen or compromised password can be used to damage, change, or steal data. For example, if an HR employee’s password is compromised, regular updates can minimize the risk.
- Reduces the risk of password reuse: Manual password rotation often leads to users recycling or reusing variations of the same password. Automated systems mitigate this by generating strong, unique passwords, preventing users from adopting bad habits.
Additionally, password rotation is a critical measure for organizations that have shared accounts or use contractors, and for securing accounts when offboarding employees.
The challenge of manual password rotation
While password rotation is still relevant, not all methods are created equal. Manual password rotation comes with challenges such as user fatigue, weak password creation, and reduced productivity. Users may have difficulty generating and remembering new, strong passwords, opting instead for easy-to-remember patterns or predictable variations of old passwords, leaving accounts vulnerable to attack.
Additionally, enforcing manual password rotation disrupts workflows. Employees can waste time remembering or resetting forgotten passwords, which detracts from their primary work tasks. Frequent changes without automated systems can lead to more frustration than safety.
Balance security and usability with automated password rotation
Automated password rotation addresses the shortcomings of manual password changes while maintaining a high level of security. Organizations can benefit from:
- Reduced user burden: Automated systems eliminate the need for users to remember or create new passwords. By automatically generating and replacing passwords, employees can focus on their work without interruptions.
- Stronger password practices: Automated systems ensure that new passwords meet complexity requirements, reducing the chance of successful brute force or credential stuffing attacks.
- Enhanced security for privileged accounts: Privileged accounts benefit the most from automated password rotation, as regular updates limit exposure time and ensure that even insiders cannot abuse static credentials.
- Minimal disruption: Automated password rotation takes place behind the scenes, allowing users to continue their work without having to regularly reset their passwords.
Securely implement automated password rotation
To implement automated password rotation, organizations should consider using a Privileged Access Management (PAM) solution that automates the generation, rotation, and secure storage of passwords. This ensures that strong passwords are regularly updated and stored in an encrypted vault, accessible only to authorized accounts on a principle of least privilege to limit exposure.
Embracing a modern approach to password security
NIST’s updated guidelines reflect a more nuanced approach to password security, emphasizing the importance of strong, unique passwords while emphasizing frequent manual switching. However, password rotation remains critical for privileged accounts.
Automated password rotation is the key to balancing security and usability in today’s complex threat landscape. Organizations must adopt modern PAM solutions to implement strong password practices without burdening users so that sensitive data remains protected and productivity is maintained. By embracing automated password rotation, companies can stay ahead of cyber threats and protect their most critical systems and information.
We’ve highlighted the best business password manager.
This article was produced as part of TechRadarPro’s Expert Insights channel, where we profile the best and brightest minds in today’s technology industry. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing, you can read more here: