Montana State University Password Guidelines TABLE OF CONTENTS 1. Overview 2 2. General Password Guidelines 2 3. Administrative System Accounts 2 4. Luminis Portal Accounts 3 5. Windows Domain Accounts 4 6. Windows Server Administrator Accounts 4 7. Windows Service Accounts 5 8. UNIX, Linux, Macintosh, and VMS User Accounts 5 9. UNIX, Linux, Macintosh, and VMS Root Accounts 5 10. Application Accounts 5 MSU Security Operations Team – April 2008 Page 1 1. Overview As MSU continues to enhance the security of the computing and information environment, an effort has been undertaken to better protect the accounts that control access to our electronic resources. Passwords are the first line of defense and one of the most frequently attacked layers of our security model. Maintaining a strong password is a simple yet effective approach for protecting ourselves from this threat. This document provides the minimum password standards for different types of accounts used for accessing Montana State University (MSU) enterprise-level computer systems, applications, and information. It establishes guidelines for password strength, password lifecycle, and account lockout due to inactivity or abuse. 2. General Password Guidelines Some systems may not be specifically addressed in this document. Where technically feasible, system users and administrators are expected to follow these basic minimum password guidelines: Eight character minimum Upper and lower case letters At least one number At least one special character 180-day password lifetime* Passwords should never contain portions of a user’s name, account name, or any information that can be personally identifiable with the individual. * For the purpose of this document, the term “lifetime” refers to the recommended lifespan of a password. When the lifespan has been reached, it will be up to the user to change the password. The term “expiration” refers to the forceful expiration of a password by the server or application. 3 Administrative Systems User Accounts MSU collects and maintains administrative data vital to the mission of the university. This data includes detailed records on students, staff, and faculty that is required for day to day operations. Ensuring the security of this information is critical to MSU and as such, several layers of protection are in place to safeguard against exposure. The first line of defense lies with the security of the accounts used to access and administer this data. These guidelines are meant to reduce the risk of exposure through compromised accounts. MSU Security Operations Team – April 2008 Page 2 For the purpose of this document, administrative data includes personnel records, financial records, and all student records (prospective, current, and alumni). This includes, but is not limited to Banner user accounts and Microsoft Access reporting applications. The following password guidelines apply to all systems providing access to administrative data: Eight character minimum Upper and lower case letters At least one number At least one special character* Accounts lock after five login attempts Failed password lock-out time is 10 minutes Recommended password lifespan is 180 days Passwords cannot be reused for 180 days * Due to restrictions with Oracle and the Banner application, special characters are limited to the following: ! + - / _ ? 4. Luminis Portal Accounts Like administrative system user accounts, Luminis portal accounts contain sensitive information such as student and financial records. Password guidelines for Luminis portal accounts are as follows: Eight character minimum 20 character maximum Upper and lower case letters At least one number At least one special character* 180-day password expiration Accounts disable after 210 days of inactivity Failed login attempts based on progressive algorithm * Special characters are limited to the following: $ * % @ # & MSU Security Operations Team – April 2008 Page 3 5. Windows Domain Accounts The password guidelines below apply to all MSU Windows Domains. The intention is that these standards will align as best possible with those requirements for Luminis portal accounts, thus enabling the use of the same password for both accounts. Eight character minimum Contain characters from three of the following four categories: o Uppercase letters o Lowercase letters o Numbers o Special characters 180-day password expiration Four password history Accounts disable after 10 login attempts within 10 minutes Seven days must pass before another password change is allowed. 6. Windows Server Administrator Accounts By definition, server administrator accounts have more authority than user accounts. As such, the password management requirements are more stringent. Server administrator passwords will be changed at least every 90 days, or whenever a suspected breach occurs. 12 character minimum Upper and lower case letters At least two numbers At least two special characters 90 day password lifespan Six password history Passwords cannot be reused for 365 days MSU Security Operations Team – April 2008 Page 4 7. Windows Service Accounts Windows service accounts are used for running individual services on a server, and are not intended for interactive login. Windows service account passwords will be changed during scheduled maintenance times at least once every year. Since service account credentials are often hard-coded into applications, considerable work can be involved to change passwords. Thus a password lifespan of 180 days is recommended, but a lifespan of one year is allowed, 15 character minimum Upper and lower case letters At least two numbers At least two special characters One year password lifespan Six password history Passwords cannot be reused for 365 days 8. UNIX, Linux, Macintosh, and VMS User Accounts In general, password guidelines for UNIX, Linux, Mac, and VMS systems should align with the basic password guidelines set forth above. Systems supporting additional password strength are encouraged to take advantage of those capabilities wherever possible. 9. UNIX, Linux, Macintosh, and VMS Root Accounts Root or superuser accounts, by definition, have privileges to make critical system changes and may have access to sensitive or confidential data. Thus, passwords will be changed at least every 90 days, whenever a suspected breach occurs, or when an employee knowing the root password leaves the organization. Due to the large variability of system capabilities within this category, exact root password guidelines may be hard to standardize. However, all root accounts should adhere to the general password guidelines outlined above at an absolute minimum. Stronger root passwords are highly encouraged. 10. Application Accounts Application accounts and application database accounts are similar to Windows Service accounts. However, application account credentials should never be hardcoded. Examples of application accounts include credentials for system monitoring services, intrusion detection systems, web applications, online bulletin boards, Wikis, and document repositories. If applications contain sensitive information, password guidelines for administrative systems should be followed as best possible. Otherwise, the general password guidelines should be considered the minimum. MSU Security Operations Team – April 2008 Page 5
© Copyright 2026 Paperzz