D. Password Policy

1.Ìý ÌýPurpose

The purpose of this policy is to establish the requirements for the proper construction, usage, handling, and maintenance of all passwords at all Â̾ÞÈËÊÓƵ (Â̾ÞÈËÊÓƵ) institutions.ÌýThese requirements ensure consistent application of security controls necessary to safeguard the information and information technology resources of Â̾ÞÈËÊÓƵ and its component institutions.ÌýÂ̾ÞÈËÊÓƵ aligns itself with best practices from such organizations as National Institute for Standards and Technology (NIST) and Center for Internet Security (CIS).

2.Ìý ÌýScope

This policy applies to all passwords used to authenticate to Â̾ÞÈËÊÓƵ information technology resources or any information technology resource that stores non-public Â̾ÞÈËÊÓƵ data.

It does not apply to the following types of passwords, the requirements for each are defined elsewhere:

  • Service Account Passwords - defined as passwords used by an information technology resource to contact or interface another information technology resource
  • UNH Parent Portal Account Passwords

3.Ìý ÌýAudience

All Â̾ÞÈËÊÓƵ community members with access to institutional information or information technology resources should be familiar with this Policy and their responsibilities for complying with the requirements it defines.

4.Ìý ÌýPolicy Statement

4.1Ìý ÌýPassword Change Frequency

4.1.1Ìý ÌýAll passwords associated with Â̾ÞÈËÊÓƵ accounts shall be changed annually with the following exceptions:

  • System Administrator Accounts (every six months)
  • All non-primary identity accounts accessed by employees with privileged access shall have passwords changed upon departure of employee.

4.1.2Ìý ÌýÂ̾ÞÈËÊÓƵ community members shall be notified of the need to change their password, prior to the password’s expiration date.

4.1.3Ìý ÌýÂ̾ÞÈËÊÓƵ community members with expired passwords shall be restricted from accessing Â̾ÞÈËÊÓƵ information technology resources.

4.2Ìý ÌýPassword Construction

4.2.1Ìý ÌýPasswords shall:

  • Be between 14 and 64 characters in length
  • Be sufficiently different from previous passwords
  • Contain a minimum of 5 unique characters

4.2.2Ìý ÌýPasswords shall not:

  • include the user’s first, last, or preferred name, the user’s Â̾ÞÈËÊÓƵ username (e.g., abc1234), or the user’s Â̾ÞÈËÊÓƵ ID (e.g., 991122334)
  • be re-used
  • contain number or character sequences of 4 or more (e.g., abcd, 6789, sTuV)
  • contain characters repeated 4 or more times sequentially (e.g., bbbb, 8888, TttT, &&&&)

4.2.3Ìý ÌýKnown compromised or commonly used weak passwords are disallowed.

4.3Ìý ÌýPassword Usage

4.3.1Ìý ÌýPasswords used for Â̾ÞÈËÊÓƵ purposes shall not be used for purposes outside of Â̾ÞÈËÊÓƵ including, but not limited to personal banking, Amazon, Netflix, etc.

4.3.2Ìý ÌýPasswords used for accessing Â̾ÞÈËÊÓƵ information technology resources that require local application accounts for authentication shall not be the same as the community member’s Â̾ÞÈËÊÓƵ password.

  • Local application accounts are accounts for official university applications that do not use Â̾ÞÈËÊÓƵ credentialsÌý
  • Examples: Salesforce, Â̾ÞÈËÊÓƵ Benefits

4.4Ìý ÌýPassword Handling

4.4.1Ìý ÌýPasswords shall:

  • Be treated as sensitive, confidential information
  • Not be shared with anyone, including administrative assistants or supervisors
  • Not be written down or stored on-line in clear text
  • Not be shared in email, chat, or other electronic communication
  • Not be spoken aloud

4.4.2Ìý ÌýAdministrators of information technology resources who need to provide passwords to other administrators may use communication mechanisms for providing those passwords that are approved by Cybersecurity & Networking.

4.4.3Ìý ÌýÂ̾ÞÈËÊÓƵ community members shall not use the "Remember Password" feature of web browsers to store Â̾ÞÈËÊÓƵ passwords.

4.4.4Ìý ÌýForgotten passwords shall be reset using Â̾ÞÈËÊÓƵ approved automated mechanisms.

4.4.5Ìý ÌýÂ̾ÞÈËÊÓƵ community members with forgotten passwords who are unable to reset their password using automated mechanisms shall provide verification of identity via the approved Â̾ÞÈËÊÓƵ process.

4.4.6Ìý ÌýDefault passwords on all information system components, peripherals, and Internet of Things (IoT) devices shall be changed to passwords that meet the minimum requirements outlined in this Policy prior to installation or deployment.

4.4.7Ìý ÌýMembers of Â̾ÞÈËÊÓƵ Enterprise Technology & Services (ET&S) shall never ask users to provide their password for any Â̾ÞÈËÊÓƵ account.

4.5Ìý ÌýCompromised Passwords

4.5.1Ìý ÌýÂ̾ÞÈËÊÓƵ community members who believe their password has been compromised shall notify their local Help Desk immediately.

4.5.2Ìý ÌýIf Â̾ÞÈËÊÓƵ has reason to believe a community member’s password has been compromised, the community member’s access may be revoked, without notification, until the community member’s identity can be verified, and their password can be reset.

4.5.3Ìý ÌýÂ̾ÞÈËÊÓƵ community members with potentially compromised passwords shall provide verification of their identity and set a new password to regain access to Â̾ÞÈËÊÓƵ information technology resources.

5.Ìý ÌýEnforcement

Failure to comply with this policy puts the University System, its component institutions, and its information and information technology resources at risk and may result in disciplinary action.ÌýDisciplinary procedures will be appropriate for the individual responsible for non-compliance (e.g., students, faculty, staff, vendors) as outlined in the relevant institutional regulations for that individual (e.g., student conduct and/or applicable personnel policies).
Non-compliant technology and/or activities may be mitigated as deemed necessary by the Â̾ÞÈËÊÓƵ CISO and/or CIO.
Employees who are members of institutionally recognized bargaining units are covered by the disciplinary provisions set forth in the agreement for their bargaining units.

Contractors or vendors that fail to comply with this policy may be in violation of their contract with Â̾ÞÈËÊÓƵ and risk penalties up to contract termination.

6.Ìý Ìý·¡³æ³¦±ð±è³Ù¾±´Ç²Ô²õ

Requests for exceptions to this policy shall be submitted and approved according to the requirements provided in the Â̾ÞÈËÊÓƵ Cybersecurity Exception Standard.

7.Ìý ÌýRoles andÌýResponsibilities

  • Application Administrators
    • Ensure local application accounts, including those used to administer applications and those enabling community member access, follow all requirements defined in this policy.
  • Chief Information Security Officer (CISO)
    • Enforce this policy and related standards
    • Review this policy annually
  • Enterprise Technology & Services (ET&S)
    • Send expiring password notifications to Â̾ÞÈËÊÓƵ community members
    • Disable accounts with expired passwords per the Â̾ÞÈËÊÓƵ Password Management Standard
  • Â̾ÞÈËÊÓƵ Community Members
    • Comply with all restrictions and requirements outlined in this Policy when selecting passwords for use at Â̾ÞÈËÊÓƵ
    • Maintain the confidentiality of Â̾ÞÈËÊÓƵ passwords
    • Use unique passwords on every account (e.g., do not use your Â̾ÞÈËÊÓƵ password for other accounts)
    • Report all cybersecurity events or incidents to Cybersecurity & Networking.Ìý or example, a Â̾ÞÈËÊÓƵ password that suddenly stops working without being changed by its owner would be considered a cybersecurity event.

8.Ìý ÌýDefinitions

  • Access
  • Account
  • Administrator
  • Authentication
  • Compromised Account
  • Confidentiality
  • Cybersecurity/Information Security
  • Cybersecurity Incident
  • ·¡³æ³¦±ð±è³Ù¾±´Ç²ÔÌý
  • Identity
  • Information
  • Information Technology ResourceÌý
  • Institutional Information
  • Internet of Things (IoT)
  • Non-Primary Identity
  • Password
  • Policy
  • Privileged Access
  • Security Control
  • Standard
  • ±«²õ±ð°ù²Ô²¹³¾±ðÌý
  • Â̾ÞÈËÊÓƵ Community Member
  • Â̾ÞÈËÊÓƵ ID

CONTACT INFORMATION

For Â̾ÞÈËÊÓƵ community members: Questions about this Policy, requests for additional information or training, or reports of violations can be directed to Â̾ÞÈËÊÓƵ Cybersecurity Governance, Risk, & Compliance (GRC) via this .

All other requests can be submitted here: .
Ìý

This page last updated . For information on the adoption and effective dates of policies please see explanation on the OLPM Main Menu.