Password Policy
Password Policy
Password Policy
2. Scope: The scope of this policy includes all end-users and personnel
who have or are responsible for an account (or any form of access that
supports or requires a password) on any system/service in the NIC
domain. These include personnel with their designated desktop
systems. The scope also includes designers and developers of individual
applications.
3.Policy
3.1 Policy Statements
3.1.1 For users having accounts for accessing systems/services
3.1.1.1 Users shall be responsible for all activity performed with
their personal user IDs. Users shall not permit others to
perform any activity with their user IDs or perform any
activity with IDs belonging to other users.
3.1.1.2 All user-level passwords (e.g., email, web, desktop
computer, etc.) shall be changed periodically (at least
once every three months). Users shall not be able to
reuse previous passwords.
3.1.1.3 Password shall be enforced to be of a minimum length
and comprising of mix of alphabets, numbers and
characters.
3.1.1.4 Passwords shall not be stored in readable form in batch
files, automatic logon scripts, Internet browsers or
related data communication software, in computers
without access control, or in any other location where
unauthorized persons might discover or use them.
3.1.1.5 All access codes including user ID passwords, network
passwords, PINs etc. shall not be shared with anyone,
including personal assistants or secretaries. These shall
be treated as sensitive, confidential information.
3.1.1.6 All PINs (Personal Identification Numbers) shall be
constructed with the same rules that apply to fixed
passwords.
3.1.1.7 Passwords must not be communicated though email
messages or other forms of electronic communication
such as phone to anyone.
3.1.1.8 Passwords shall not be revealed on questionnaires or
security forms.
3.1.1.9 Passwords of personal accounts should not be revealed
to the controlling officer or any co-worker even while on
vacation unless permitted to do so by designated
authority.
3.1.1.10 The same password shall not be used for each of the
systems/applications to which a user has been granted
access e.g. a separate password to be used for a
Windows account and an UNIX account should be
selected.
3.1.1.11 The "Remember Password" feature of applications shall
not be used.
3.1.1.12 Users shall refuse all offers by software to place a cookie
on their computer such that they can automatically log
on the next time that they visit a particular Internet site.
3.1.1.13 First time login to systems/services with administrator
created passwords, should force changing of password
by the user.
3.1.1.14 If the password is shared with support personnel for
resolving problems relating to any service, it shall be
changed immediately after the support session.
3.1.1.15 The password shall be changed immediately if the
password is suspected of being disclosed, or known to
have been disclosed to an unauthorized party.
3.1.2 For designers/developers of applications/sites
3.1.2.1 No password shall be traveling in clear text; the hashed
form of the password should be used. To get around the
possibility of replay of the hashed password, it shall be
used along with a randomization parameter.
3.1.2.2 The backend database shall store hash of the individual
passwords and never passwords in readable form.
3.1.2.3 Password shall be enforced to be of a minimum length
and comprising of mix of alphabets, numbers and
characters.
3.1.2.4 Users shall be required to change their passwords
periodically and not be able to reuse previous
passwords.
3.1.2.5 For Password Change Control, both the old and new
passwords are required to be given whenever a
password change is required.
4. Responsibilities:
4.1 All individual users having accounts for accessing
systems/services in the NIC domain, and system/network
administrators of NIC servers/ network equipments shall ensure
the implementation of this policy.
4.2 All designers/developers responsible for site/application
development shall ensure the incorporation of this policy in the
authentication modules, registration modules, password change
modules or any other similar modules in their applications.
5. Compliance
5.1 Personnel authorized as Internal Audit shall periodically review
the adequacy of such controls and their compliance.
5.2 Personnel authorized as Application Audit shall check respective
applications for password complexity and password policy
incorporation.