Time
2 hours 23 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:01
Hello and welcome to this continued I t. Security Policy training from Cyber Harry. This is module to password management policy,
00:09
and I am Troy Lemaire.
00:11
Learning objective for this training will be password creation,
00:14
password change, password protection, application development and multi factor authentication.
00:21
But we're gonna use another Sands policy template, this one on password protection policy.
00:27
The overview is passwords. Important aspect of computer security. Poorly chosen password may result in unauthorized access
00:34
and our exploitation of our resources.
00:38
Purpose of the policies establishes standard for creation of strong passwords and protection of these passwords.
00:44
Go for the policy includes all personnel who have are responsible for an account on any system that resides at any facility that is owned by the company.
00:53
So let's get into the body of the policy
00:56
password creation.
00:58
I'll user level insistent level passwords must conform to the password Construction guy lines that will be our next train. Where were we will talk about that.
01:06
Users must use a separate, unique password for each of their work related accounts. Users may not use any work related passwords for their own personal accounts,
01:12
so this is where you're going to have to have some type of leeway in regards to unique passwords for each of their work related accounts.
01:23
Basically, some accounts may have to be the same because they may have to link together. So you're gonna have to modify that as needed. And then any work related passwords for their own personal counts. You definitely don't want them using that.
01:36
There are situations where
01:38
you have sights outside of your work environment, such as linked in or Adobe that have gotten hat.
01:44
So if that user uses the same password password, 123 is an example on their work related accounts and then also use it for linked in an adobe.
01:53
Well, those accounts have been hacked, and so therefore, those credentials and passwords are public now, and it'll make it easier for them someone to be able to hack into the work accounts. So you want to make sure that they have
02:05
no relation whatsoever between their work passwords
02:08
and then their personal account passwords, even if it is a work related personal account
02:15
user accounts that have system level privilege granted through group memberships.
02:19
Such a pseudo are any type of admin must have a unique password from all other accounts held by that user access system level privileges.
02:28
Basically, most organizations will have a user account,
02:31
and then they will have a admit account.
02:35
Those accounts are different, and then those passwords should be different as well. You don't want the same person using the same password for both accounts, because it'll be easy to get those and somebody be able to go into that account and gain administrative access if they're able to get their normal access.
02:51
Compromise,
02:53
then additions Highly recommended. Some form of multi factor authentication is used for any privileged accounts.
03:00
Password changes. Password should be changed only when there is a reason to believe a password has been compromised.
03:06
Now this is newer
03:07
type of thinking that is out there and newer guidance.
03:10
Sometimes you have certain systems that you want to mandate a certain time frame 30 day
03:16
to change your passwords. 60 day to change her password. 90 day to change your password so that they aren't having the same password in the system
03:24
or extended period of time.
03:28
Password. Cracking her guessing. Maybe perform on periodic around the bases by the Info SEC team or his delegates
03:34
passwords guest or cracked.
03:35
Then the users will be required to change it to be in compliance with the password construction guidelines.
03:42
That's where protection passwords not be shared with anyone, including supervisor and co workers.
03:46
They should should be treated as sensitive and confidential.
03:50
Passwords must not be inserted into email messages. Passwords may be stored only and password managers
03:57
that are authorized by the organization and do not use remember password feature
04:01
of applications. For example, Web browsers in a user, suspecting that his or her password may have been compromised, must report incidents
04:10
and change all passwords
04:13
due In regards to application development application developers must ensure their programs contain the following security precautions.
04:19
Application must support authentication of individual users, not groups. A patient must not store passwords and clear texts.
04:27
Applications may not transmit passwords and clear text over the network
04:30
application. Let's provide for some sort of role management so that one user can take over the function of another without having to know the others password.
04:36
That's all based on the type of information out there. Finding here for application of element is ways that if you did not follow these rules, it would be very easy for somebody to be able to hack, crack or guess these passwords because of the format that they're being passed for this application.
04:56
Multi factor authentication multi factor authentication is highly encourage and should be used whenever possible, not only for work later accounts, but personal accounts. Also
05:04
again, we're getting to the client's part.
05:08
Information team will verify compliance through various methods.
05:12
Any exceptions to the policy must be approved in advance, and then employees found that violated this policy may be subject to disciplinary action, so those are all the standard ones that we have in each policy or should have in each policy.
05:26
Well, summary Today we covered
05:28
password creation, password change,
05:30
password protection, application development and multi factor authentication.
05:36
So a recap question for password management policy
05:40
Users may not use any work related passwords. Four.
05:46
And that would be their personal accounts, even work related personal accounts.
05:53
Now the recap question passwords may only be stored in
05:57
blank blank, authorized by the organization
06:01
that would be password managers that are authorized by the organization.
06:08
Oh, in our next lecture, we're gonna look at more general policies were gonna continue from the password management and go into password construction, which is Reppert referenced in the password management policy
06:19
Questions. Clarifications
06:21
reached me on Cyberia message. My user name is that trial a mirror and thank you for attending this cyber ery training.

Up Next

Introduction to IT Security Policy

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Instructed By

Instructor Profile Image
Troy LeMaire
IT Security Officer at Acadian Ambulance
Instructor