THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY



Similar documents
CAPITAL UNIVERSITY PASSWORD POLICY

ICT Password Protection Policy

Cal State Fullerton Account and Password Guidelines

Ex Libris Group Password Management Policy

Boston University Security Awareness. What you need to know to keep information safe and secure

Document Control Policy & Procedure 15

PASSWORD MANAGEMENT POLICY OCIO TABLE OF CONTENTS

CITY OF BOULDER *** POLICIES AND PROCEDURES

Information Security Policy. Policy and Procedures

CYBERSECURITY POLICY

Password Expiration Passwords require a maximum expiration age of 60 days. Previously used passwords may not be reused.

Password Standards Policy

DHHS Information Technology (IT) Access Control Standard

SPICE EduGuide EG0015 Security of Administrative Accounts

1 Purpose Scope Document Owner Information Security Standard Document Review Cycle Revision History...

The City of New York

GENEVA COLLEGE INFORMATION TECHNOLOGY SERVICES. Password POLICY

IT ACCESS CONTROL POLICY

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

SANS Institute First Five Quick Wins

e-governance Password Management Guidelines Draft 0.1

Network Security Policy

Network and Workstation Acceptable Use Policy

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

Network Password Management Policy & Procedures

Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-

ICT USER ACCOUNT MANAGEMENT POLICY

RemotelyAnywhere. Security Considerations

Office of Information Technology Desktop Security and Best Practices

State of South Carolina Policy Guidance and Training

Setting Up Scan to SMB on TaskALFA series MFP s.

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Health and Human Services Enterprise Information Technology Security Training Resource Guide

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

RELEASE NOTES. Release Notes. Introduction. Platform. Product/version/build: Remote Control ( ) ActiveX Guest 11.

Privacy Policy. PortfolioTrax, LLC v1.0. PortfolioTrax, LLC Privacy Policy 2

Identification and Authentication on FCC Computer Systems

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

USFSP Network Security Guidelines

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 5

Endpoint Security Client for Mac

Smart Card Setup Guide

The Security Behind Sticky Password

Information Technology Security Procedures

VoipSwitch Security Audit

HIPAA Assessment HIPAA Policy and Procedures

RESOURCE AND PATIENT MANAGEMENT SYSTEM. Drug Accountability (PSA) GUI Invoice Upload Program Installation and Configuration Guide

NETWORK SECURITY GUIDELINES

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Application Security Policy

Apollo Education Group Information Security

Policy Title: HIPAA Access Control

RSA Authentication Manager 8.1 Help Desk Administrator s Guide

BSHSI Security Awareness Training

ARMY PASSWORD STANDARDS Version 2.5

Acceptable use policy

Procedure Title: TennDent HIPAA Security Awareness and Training

H.I.P.A.A. Compliance Made Easy Products and Services

Enterprise Security Critical Standards Summary

IT and Mobile Devices Security Policy

SECURING YOUR REMOTE DESKTOP CONNECTION

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Remote Desktop Administration

Quick Start Guide to Logging in to Online Banking

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Hang Seng HSBCnet Security. May 2016

Transcription:

THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY 1.0 Purpose The purpose of this policy is to establish Office of Human Resources (OHR) standards for creation of strong passwords, the protection of those passwords, and their frequency of change in order to ensure the security of OHR networks and information systems. 2.0 Scope This policy applies to but is not limited to faculty, staff, students, vendor representatives, consultants, temporary staff, and other workers in OHR, including all personnel affiliated with third parties. This policy applies to but is not limited to all equipment that is connected to OHR networks, used in OHR facilities, or used outside OHR facilities to conduct OHR business. Note: All faculty, staff and students are bound by ITS policies regulating their Penn State Access Accounts. Those policies can be viewed at http://its.psu.edu/policies/password.html Exceptions to this policy may be necessary to perform security audits or other authorized purposes. Any exceptions must be coordinated through the OHR Information Technology (IT) Security Officer and approved by the Director or Associate Vice President for Human Resources. 3.0 Background Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of OHR computer networks and information systems. As such, all OHR employees (including contractors, temporary personnel, and vendors with access to OHR information systems) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords. 4.0 Policy 4.1 General All system-level passwords (e.g., root, enable, NT admin, application administration accounts, etc.) must be changed at least every three months. All user-level passwords (e.g., e-mail, web, desktop computer, etc.) must be changed at least every six months. The recommended change interval is every three months. All passwords must have a minimum of eight characters with a combination of letters, numbers, and special characters. Longer passwords are significantly more secure and recommended. User accounts that have system-level privileges granted through group memberships or programs such as "sudo" under UNIX and Mac OS X, or Run As under Windows must have a password different from passwords used with any other accounts held by that user. Page 1 of 5

Passwords must not be inserted into e-mail messages or other forms of electronic communication. Where System Network Management Protocol (SNMP) is used, the community strings must be defined as something other than the standard defaults of "public," "private" and "system" and must be different from the passwords used to log in interactively. A keyed hash should be used where available (e.g., SNMPv2). All user-level and system-level passwords must conform to the guidelines described below. 4.2 Guidelines A. General Password Construction Guidelines Passwords are used for various purposes within OHR networks and information systems. Some of the more common uses include: user-level accounts, web accounts, e-mail accounts, screen saver protection, voicemail password, and local network equipment logins. Everyone should be aware of how to select strong passwords since very few systems have support for one-time tokens (i.e., dynamic passwords which are used only once). Poor, weak passwords have the following characteristics: The password contains less than eight characters The password is a word found in a dictionary (English or foreign) The password is a common usage word such as: o Names of family, pets, friends, co-workers, fantasy characters, etc. o The user s ID or subset thereof o Computer terms and names, commands, sites, companies, hardware, or software o The words "Office of Human Resources", "OHR", "<Department Name>" or any derivation o Birthdays and other personal information such as addresses and phone numbers o Letter or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc. o Any of the above spelled backwards o Any of the above preceded or followed by a digit (e.g., secret1, 1secret) Strong passwords have the following characteristics: Contain both upper and lower case characters (e.g., a-z, A-Z) Have digits and punctuation characters as well as letters (e.g., 0-9,!@#$%^&*()_+ ~-=\`{}[]:";'<>?,./) Are at least eight alphanumeric characters long Are not a word in any language, slang, dialect, jargon, etc. Are not based on personal information, names of family, etc. Page 2 of 5

Passwords should never be written down or stored on-line. Try to create passwords that can be easily remembered. One way to do this is create a password based on a song title, affirmation, or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation. NOTE: Do not use either of these examples as passwords! B. Password Protection Standards Do not use the same password for OHR accounts as for other non-ohr access (e.g., personal ISP account, online banking, etc.). Where possible, don't use the same password for various OHR access needs. For example, select one password for OHR Windows Domain (Active Directory) systems and a separate password for any thirdparty hosted web services that have their own authentication system. Do not share OHR passwords with anyone, including staff support. All passwords are to be treated as sensitive, confidential OHR information. Here is a list of "don ts": Don't reveal a password over the phone to ANYONE Don't reveal a password in an email message Don't reveal a password to supervisors, managers, or co-workers Don't talk about a password in front of others Don't hint at the format of a password (e.g., "my family name") Don't reveal a password on questionnaires or security forms Don't share a password with family members Don't reveal a password to others while on vacation Don t use the Remember Password feature of applications (e.g., Eudora, Outlook, Internet Explorer, Firefox, other web browsers, or any web sites) If someone demands a password, refer them to this document or have them contact the OHR Information Technology (IT) Security Officer or Security Operations and Services (SOS) Department. Again, do not write passwords and store them anywhere in your office. Do not store passwords in a file on ANY computer system (including Mobile Phones and devices) without encryption. If an account or password is suspected to have been compromised, immediately report the incident to OHR IT Security Officer and change all passwords. To ensure system security and policy compliance, password cracking or guessing may be performed on a periodic or random basis by the SOS Department, the OHR IT Security Officer, or their delegates. If a password is guessed or cracked during one of Page 3 of 5

these scans, the users will be required to change their passwords, and ensure it is compliant to all relevant policies. C. Application Development Standards Internal application developers must ensure their programs contain the following security precautions. Applications should: support authentication of individual users, not groups; not store passwords in clear text or in any easily reversible form; provide for role management, such that one user can take over the functions of another without having to know the other's password; and support Penn State Web Access standards, wherever possible. D. Passphrases Passphrases are generally used for public/private key authentication. A public/private key system defines a mathematical relationship between the public key that is known by all, and the private key that is known only to the user. Without the passphrase to "unlock" the private key, the user cannot gain access. Passphrases are not the same as passwords. A passphrase is a longer version of a password and is therefore, more secure. A passphrase is typically composed of multiple words. Because of this, a passphrase is more secure against "dictionary attacks". A good passphrase is relatively long and contains a combination of upper and lowercase letters and numeric and punctuation characters. An example of a good passphrase: "The*?#>*@TrafficOnThe101Was*&#!#ThisMorning" All of the rules above that apply to passwords apply to passphrases. E. Use of Passwords and Passphrases for Remote Access Users Access to the OHR networks via remote access is to be encrypted traffic, established using either a one-time password authentication or a public/private key system with a strong passphrase. A VPN is an example of a public/private key system. 5.0 Enforcement Any employee found to have violated this policy may be subject to disciplinary action by their Administrative unit or the University. Disciplinary action may include termination of employment. Page 4 of 5

6.0 Definitions Term Definition Application Administration Account Any account that is for the administration of an application (e.g., Oracle database administrator, ISSU administrator) sudo System-Level Users-Level VPN The sudo (stands for super user do) command is a program for some Unix and Unix-like computer operating systems that allows users to run programs with the security privileges of another user (normally the superuser, or root). Consists of several programs that help the local computer manage its own resources, such as manipulating files, running programs and controlling the keyboard and screen. Consists of program settings and data that help the user manage their resources, such as manipulating files, running productivity programs and provides access control to printers, or other network resources based on username. Virtual Private Network - provides secure tunnel for transmitting data through an unsecured network, usually network to network or client to network. 7.0 Resources For additional guidance, refer to PSU Policies: ADG01 Glossary of Computer Data and System Terminology AD20 Computer and Network Security AD22 HIPAA AD23 Use of Institutional Data AD35 University Archives and Records Management 8.0 Revision History This Version Effective Date 07/28/10 Policy s Initial Date (Interim Draft) 7/28/10 Original Draft 7/18/08 Page 5 of 5