Authentication and Password Strength Guidelines
Some desert flowers - Rye

Authentication and Password Strength Guidelines

Authentication Solution and Sensitive Accounts?

  • Do NOT allow login with sensitive accounts (used internally within the solution) to any front-end user-interface.
  • Do NOT use the same authentication solution (e.g., IDP / AD) for unsecured access (e.g., public access / DMZ) as used internally.

Proper Password Strength Controls?

A critical aspect of authentication is password strength. A strong password policy is essential to protect against unauthorized access. The following characteristics define a strong password:

  • Password Length: Enforce a minimum length for passwords. Passwords shorter than 8 characters are considered weak (NIST SP800-63B).
  • Set a reasonable maximum password length to avoid vulnerabilities while allowing passphrases.
  • Do not silently truncate passwords; refer to the Password Storage Cheat Sheet for guidance on handling longer passwords.
  • Allow usage of all characters, including unicode and whitespace; avoid limiting character types.
  • Ensure credential rotation in the event of a password leak or compromise identification.
  • Implement a password strength meter to assist users in creating complex passwords and blocking common or breached passwords.
  • Utilize libraries like zxcvbn-ts for password strength assessment.
  • Consider checking passwords against Pwned Passwords, a service that identifies previously breached passwords. You can host it yourself or use the API.

Use these guidelines to strengthen your controls

pwnd

Long Password DOS

Authentication and Error Messages?

Incorrectly implemented error messages in the case of authentication functionality can be used for the purposes of user ID and password enumeration. An application should respond (both HTTP and HTML) in a generic manner.

Authentication Responses?

Using any of the authentication mechanisms (login, password reset or password recovery), an application must respond with a generic error message regardless of whether:

The user ID or password was incorrect. The account does not exist. The account is locked or disabled.

INCORRECT AND CORRECT RESPONSE EXAMPLES

Login?

Incorrect response examples:?

"Login for User foo: invalid password." "Login failed, invalid user ID." "Login failed; account disabled." "Login failed; this user is not active."

Correct response example:?

"Login failed; Invalid user ID or password." Password recovery?

Incorrect response examples:?

"We just sent you a password reset link." "This email address doesn't exist in our database."

Correct response example:?

"If that email address is in our database, we will send you an email to reset your password."

Account creation?

Incorrect response examples:?

"This user ID is already in use." "Welcome! You have signed up successfully." Correct response example:

"A link to activate your account has been emailed to the address provided."

Lisa Dy, CPA, MBA

Mindset Coach & Speaker?? | I help analytical leaders confidently accomplish big goals by maximizing mental performance & eliminating self-doubt | Book Your Mindset Breakthrough Call ??

6 个月

Very informative and great tips! Thanks Rye!

要查看或添加评论,请登录

Rye Whalen ??的更多文章

  • The Power of Peripheral Vision

    The Power of Peripheral Vision

    Embracing Adversity: A Skiing Analogy for Resilience As I reflect on my personal growth journey, I'm reminded of a…

  • The Reality of Infosec Challenges: It's Not Just About Technology

    The Reality of Infosec Challenges: It's Not Just About Technology

    When it comes to information security, many people assume that the biggest challenges lie in the realm of technology -…

    5 条评论
  • Rural Access to Cycle Infrasturcture, Pima County

    Rural Access to Cycle Infrasturcture, Pima County

    Exploring Cycling Opportunities Are you interested in cycling as a mode of transportation or recreation? Understanding…

    1 条评论
  • The Cognitive Engine of Developer Problem-Solving

    The Cognitive Engine of Developer Problem-Solving

    Imagine a software developer at a midsize organization, embarking on a new feature project prioritized by her…

  • Understanding the "Account Operators" Group in Active Directory

    Understanding the "Account Operators" Group in Active Directory

    Active Directory Privileged Access Introduction The challenge of understanding the access privileges of various groups…

    2 条评论
  • Understanding the "Account Operators" Group in Active Directory

    Understanding the "Account Operators" Group in Active Directory

    Active Directory Privileged Access Introduction The challenge of understanding the access privileges of various groups…

    4 条评论
  • IMAGINATION WORKSHOP

    IMAGINATION WORKSHOP

    It’s October! This months theme is Imagination and in that vein, how can we be more imaginative in the work we do?…

  • MASTERING THE IMPLEMENTATION OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT

    MASTERING THE IMPLEMENTATION OF SECURITY REQUIREMENTS IN SOFTWARE DEVELOPMENT

    Implementing security requirements effectively involves a structured approach encompassing several crucial steps. In…

    2 条评论
  • 5 Domains for a sense of place.

    5 Domains for a sense of place.

    This article discusses five different decision-making domains, each with its unique characteristics and approaches: 1…

    2 条评论
  • Debugging

    Debugging

    Complexity in System Performance? Complexity: Symptoms are often far removed from the root cause. Multiple Causes:…

    2 条评论

社区洞察

其他会员也浏览了