About Us | Contact Us
View Cart

Former NIST Official Regrets Issuing Password Guidance

By Vigilize | Monday, August 21, 2017 - Leave a Comment

Bill Burr admits security advice actually created more vulnerable passwords.


An article review.


ServIcons_ITAudit_01If you’ve ever angrily questioned some seemingly arbitrary rule when creating a new password, there is some vindication for you: the former government official whose password security suggestions became the basis for many organization’s own standards now says he regrets writing the document.

These regrets came to light in a recent article, which came to us by way of Wes Pollard at Home Bank. In the article, former NIST Manager Bill Burr admitted his 2003 NIST Special Publication led to users taking “lazy shortcuts” and using predictable methods when creating passwords, making them easier to crack.

Burr also now disagrees with his recommendation to have passwords expire after 90 days–something that we have spoken about here on multiple occasions!

Now, instead of dancing on the grave of the aging myth that was included in the original NIST Special Publication 800-63, let’s address the still confusing issue of password make-up.  Bill Burr also regrets that fact that many people are now using “predictable phonetics” to make their passwords strong.  Many of you who have received training from infotex may think that we too regret our advice, which USED to mirror the strong password makeup suggestions of the NIST publication.

While we do admit that we too suggested using @ for a and $ for s, that was more than a decade ago.  We long ago changed our approach, suggesting that you use sentences longer than 14 characters in length, use disparate words I your sentences, mix up your themes, etc.  We still teach the six factor makeup, and still believe in it, whenever you can’t use long sentences of disparate words.  And we’d rather users adopt the practices pushed in the NIST guidance than no practice at all.

So yes, 11 years ago we agreed with NIST guidance, but since we have been trying to get the world to see that the best password is a sentence of disparate words.  For example:  Original USED admit decade could be a password, all based on words used in this paragraph.  The infotex policy is still to throw a password that is “strong” as defined in the original NIST guidance.  Thus, in order for the above password to comply with infotex policy, we’d need to add an eight character “strong” password in there somewhere, like Original USED admit decade $tr0ng3r!  (Yes, we’re using a $ for an s, a zero for the oh, and a 3 for the e.  But we still maintain the likelihood of you guessing that, even if you KNEW it was a phonetic of “stronger,” is very, very low.

 


Original article by Nick Statt, writing for The Verge.


same_strip_012513


 

Latest News
    Artificial intelligence carries risk, but so does organic ignorance … Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . At a recent conference, I noticed two camps emerging in the debate over artificial intelligence. Some people embrace AI as a tool, while others support Elon […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX We are pleased to announce the appointment of Nathan Taylor as our new Network Administrator at infotex.  “We are very excited to have Nathan join our team as a Network Administrator and look forward to his contributions to maintaining and improving our infrastructure!” […]
    about artificial intelligence . . . And who will protect us from it . . .  Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Just watched some press on the the Senate hearings over regulating AI. The normal senator faces, Sam Altman of OpenAI, […]
    The Evolution of an Inside Term Used in our Vendor Risk Report Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Those who audit infotex know that our vendor risk report refers to a couple of our providers as “ransomware companies.” This reference started evolving […]
    Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    New tools could allow unskilled attackers to launch increasingly sophisticated attacks… An article review. Imagine a world where you receive a call from your boss asking you to assist them with something… only it’s not your boss, but an AI being used by an attacker.  This isn’t science fiction, it’s an actual attack that has […]
    Unavailability Strikes Where it doesn’t matter anyway Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So, I’m writing today’s article from a resort in the middle of Wisconsin.  I want to make sure I’m staying on top of my New Leaf, which is to […]
    . . . and the importance of segregated response. The latest edition of Executive Vice President, Michael Hartke’s article series! In 2007 when I first joined infotex, coming from small to medium sized business general IT support into the world of cybersecurity, the one thing that was very hard for me to internally rectify was […]
    How concerts can help us understand APTs . . . Especially if you use your imagination! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . My daughter reminded me of a concert Stacey and I attended way back in 2013, in Chicago.  It was one […]
    Mutiny! The Malicious Insider Threat Webinar Registration A Webinar-Video It is often awkward to bring up the one attack vector most of us have not addressed. The malicious insider threat. Even if we can flaunt all statistics and claim that the likelihood of an insider attack is low in our bank, the impact is still […]