Password Management Procedure
Ref. No. |
Executive sponsor |
Policy steward |
Approval authority |
First approved |
Last reviewed |
Effective date |
Next review |
64.03 |
Vice President, College Services and Strategy |
Chief Information Officer |
|
|
|
|
|
- Purpose
- The purpose of this procedure is to establish requirements and guidelines for creating and managing passwords.
- Scope
- This procedure is associated with the NSCC Information Security Policy 64.01. All definitions, general roles and responsibilities, and compliance measures contained with Policy 64.01 apply to these procedures.
- This procedure applies to all NSCC Community members, and any vendors, contractors, and third parties conducting business with NSCC.
|
Term |
Definition |
3.1 |
NSCC Community |
A member of the NSCC Community under this procedure includes, but is not limited to the following:
- Employee: any person who is employed by NSCC or provides services to NSCC under an employment contract.
- Student: any person enrolled in study at NSCC.
- Volunteer: any person performing work for NSCC in an unpaid capacity.
- Contractor: any individual or company (and its employees) who provides services to NSCC under a service contract (i.e. a non-employee-employer relationship)
- Community Member: any person working in collaboration with NSCC for a business or academic purpose or an external community member
|
3.2 |
Authentication |
The process of determining if someone is who, or what they are declaring to be. Passwords are commonly used for authentication for computer networks. |
3.3 |
Alphanumeric character |
A character that is a letter or a number. |
3.4 |
Manager, Digital Innovation & Technology |
The individual within an organization responsible for security policies, procedures, and controls in support of the security and compliance goals of the business. |
3.5 |
Passphrase |
A sequence of characters used to confirm the identity of an individual requesting access to a computer system, website, etc. In contrast to a password, a passphrase typically has fewer complexity requirements but greater length resulting in a net increase in both security and usability. |
3.6 |
Password |
A sequence of characters (numbers, letters, special characters) used to confirm the identity of an individual requesting access to a computer system, website, etc. |
3.7 |
Special character |
A non-alphanumeric keyboard character. Examples include punctuation marks and typographic symbols such as the number sign (#), asterisk (*), percent (%), as well as space ( ). |
- Policy
- This procedure has been written to establish a standard for creation of strong passwords, explaining basic password protection and covering when passwords expire. This procedure defines the password controls for any entity who currently, or in the future, may be granted access to NSCC information systems, services or individual devices that require a password for authentication.
- Enforcement Responsibility
The procedure will be monitored by the Director, Digital Innovation & Technology and any suggested changes should be submitted through that office. The Director, Digital Innovation & Technology, Manager, Digital Innovation & Technology, Security Analyst and all department managers will be responsible for maintaining and enforcing this procedure.
- Password Requirements
- The password must be a minimum of 12 characters.
- The password cannot contain any part of your name or full name.
- The password must contain a certain degree of complexity, must contain upper and lower case letters, numerals and non-alphanumeric characters.
- You must not reuse any of your 6 most recent passwords.
- Do not use the same password you currently use of have previously used for any other of purposes. (Personal email, e-commerce websites, internet forums, etc.)
- Password Guidelines
The following guidelines should be followed when creating a password. The password should be:
- Long enough to be hard to guess;
- Hard to guess intuitively – even by someone who knows the person creating the password well; and
- The password should not contain any of the following:
- The name or nickname of the individual creating the password, or any individual or pet the individual creating the password knows;
- Any date or number important to the individual creating the password; or
- A famous verbatim quotation from literature or popular culture.
- Password Protection
- Never share your password with another person
- If a document, service or device containing or having access to your password has been lost, stolen, or compromised you must immediately change your password and notify the Digital Innovation & Technology (DI & Tech) department
- The DI & Tech department technical staff must positively identify the employee in order to complete the password reset request. There are no generic or shared Active Directory accounts/passwords.
- Exceptions must be approved by DI & Tech Management.
- DI & Tech staff are to use and follow the Local Admin Password Solution (LAPS) practice.
- Password Reset
- A lockout will after 5 failed login attempts. Accounts will remain locked out for a period of 15 minutes or until the user remedies it through the Password Management Tool or contacts technical support.
- The DI & Tech department technical staff will not provide password changes over the phone if the password is forgotten.
- Any employee requests to change/reset passwords via DI & Tech staff require DI & Tech Manager approval.
- Administrative Passwords
- Administrative passwords are to be limited in use. Provisioned based on job role/duties. Only to be used for absolute administrative functions.
- Personnel with Administrative accounts will also have limited privileged accounts for day-to-day use.
- Administrative accounts are not to be used outside of administrative tasks, no elevated accounts to be use for day to day tasks.
- All DI & Tech staff will use Multi-Factor authentication (if option is technically available)
- The “Run As” functionality will be used to run specific administrative tasks while logged into systems under limited account access.
- LAPS is to be used as default local admin password solution
- All exception requests, temporary or permanent, must be approved in writing by the Director, Digital Innovation & Technology.
- All revisions to this procedure will be made in accordance with the NSCC Policy Development, Renewal and Approval Policy (78.01) and Procedures (78.02)
Related Policies & Procedures
64.01 Information Security Policy
64.02 Information Security Classification Procedure
64.03 Password Management Procedure
64.04 Access Control Procedure
64.05 Physical and Environmental Security Procedure
64.06 Physical Access to IT Infrastructure Procedure
64.07 Secure Disposal or Reuse of Equipment Procedure