...
Responsibility and Accountability:
All individuals with access to the Company's systems must select strong, secure passwords and are responsible for keeping their passwords confidential.
Prohibited Use of Passwords:
Passwords must not be shared through non-secure channels, including but not limited to email, social media, and other forms of electronic communication not explicitly approved for secure information exchange.
Password Strength and Complexity:
Passwords must be at least 12 characters long and include a mix of uppercase letters, lowercase letters, numbers, and special characters. Passwords must not contain personal information, common dictionary words, or easily guessable sequences.
Initial Password Use and Change:
Password Expiry and History:
Passwords must be changed at least every 365 days. The system will remember the last 4 passwords, and they cannot be reused.
Frequency of Password Changes:
Users are encouraged to change their passwords more frequently if any suspicion of compromise arises. Mandatory password changes are required after any security incident.
Account Lockout Policy:
Accounts will be locked after five consecutive failed login attempts and will remain locked for 30 minutes to prevent unauthorized access through brute force attacks.
Secure Password Storage:
Passwords must be stored securely using salted hashes to prevent unauthorized retrieval and decryption. Clear text storage of passwords is strictly prohibited.
Protection of Authentication Credentials:
Users must protect their passwords, PINs, security tokens, and other authentication methods. The use of password managers is recommended for secure password storage.
Password Reset:
Users are permitted to reset their passwords whenever necessary, especially if a compromise is suspected.
Production Server Access:
Access to production database servers is restricted to authorized personnel only, as determined by the IT Manager.
Web-Based Application Authentication:
All web-based applications must implement a secure authentication layer, with multi-factor authentication (MFA) strongly recommended for enhanced security.
Unattended Sessions:
Workstations must be configured to automatically lock after 30 minutes of inactivity to prevent unauthorized access.
...