(1) This procedure sets out Charles Sturt University's (the University’s) standards regarding Password and Personal Identification Number (PIN) management (including strength, quality, creation, protection, storage, re-use and re-setting) and maintenance. (2) Passwords are the primary authentication credential used by Charles Sturt University's Information and Communication Technology (ICT) systems to verify the identity of individuals wanting to gain authorised access to ICT systems. (3) Poor choice of passwords and/or poor password management may present unacceptable risk to staff, student and University information in the form of unauthorised disclosure, loss of integrity and/or information availability. (4) This procedure applies to all authorised users who: (5) This procedure should be read in conjunction with: (6) For the purpose of this procedure: (7) Refer to the Information and Communications Technology Security Policy. (8) The Division of Information Technology (DIT) is responsible for the provisioning, storage and management of centralised password datasets used for authentication to applications and ICT services listed in the University’s Applications Portfolio. (9) Authorised users are responsible for: (10) Application custodians of systems not listed in the Applications Portfolio or not using centralised authentication systems are required to comply with this procedure regarding the provisioning, storage and management of password datasets used for authentication. (11) Exemptions to this procedure must be approved in writing from the Executive Director, Division of Information Technology. (12) At the discretion of the Executive Director, Division of Information Technology, ICT systems that do not comply with this procedure may be removed from operation until compliance can be demonstrated or exemption approved. (13) Failure to comply with this procedure that occurs as a result of deliberate, malicious or negligent behaviour may result in disciplinary action as per the University's misconduct processes. (14) All passwords are classified as Highly Confidential as per the University’s Data security classification scheme. (15) User password strength and complexity is based on the minimum requirements for Single Factor Authentication as defined by the Australian Government Information Security Manual (ISM). (16) All authorised user passwords must be: (17) Privileged and service account password strength and complexity is based on the minimum requirements for Single Factor Authentication as defined in Australian Government Information Security Manual (ISM). (18) All privileged and service account passwords must be: (19) Passwords as part of Multi-Factor Authentication must meet the minimum strength requirements as per clause (16) and (18). (20) Passwords must not be the same as, or a variation of, the associated username. (21) Personal Identification Numbers (PIN) must be difficult to guess and not a repetition of the same digit. (22) ICT systems must capable of and configured to enforce password complexity and dictionary strength requirements. (23) When ICT systems cannot be configured to enforce password strength requirements, passwords must be checked by alternative means to ensure compliance with this procedure. (24) Upon consultation with and approval from DIT (see clause (11)), alternate authentication mechanism that do not use passwords or pin numbers may be used (e.g. biometric authentication, tokens, or certificates). (25) To minimise disruption to services, passwords should be changed prior to password expiry. (26) User passwords must expire after 120 days, resulting in the associated user account being disabled until changed. (27) Privileged passwords must expire after 90 days, resulting in the associated privileged account being disabled until changed. (28) Service account passwords must be changed after 180 days. (29) There is no password expiry requirement for students, excepting those students who are higher degree research (HDR) students with access to additional services and/or those who are also staff members. For these students user password expiry requirements outlined in this procedure apply. (30) Passwords must not be re-used for six consecutive changes. (31) Passwords cannot be changed by the authorised user more than twice a day. (32) Passwords and PINs are only to be used by an authorised user and must not be: (33) If the confidentiality of a password or PIN is in doubt, it must be changed immediately. (34) If the confidentiality of a password or PIN has been compromised, DIT will: (35) The use, storage and/or transport of plain text passwords is prohibited. (36) Authentication systems must not store passwords or PINs in a viewable or recoverable format. (37) A record of all account registration, history, status and revocation must be kept for seven years and six months after expiration or revocation (whichever is later). (38) To facilitate compliance with this procedure, the University's applications and systems must utilise centralised enterprise authentication systems where practical. (39) Forgotten, expired or locked-out passwords must be re-set and not recovered. (40) Authentication mechanisms must disable User and Privileged Accounts for a period of 30 minutes after multiple consecutive failed authentication attempts. (41) Authentication mechanisms involving the use of passwords must use secure, strong encryption protocols in the transport of account information. (42) Applications must provide role management to allow one authorised user to undertake the functions of another without the need to share passwords. (43) Nil.Password Procedure
Section 1 - Purpose
Scope
References
Top of PageSection 2 - Glossary
Top of Page
Section 3 - Policy
Section 4 - Procedures
Responsibilities
Password strength
Password changing
Password use and storage
Applications and systems
Section 5 - Guidelines
View Current
This is not a current document. To view the current version, click the link in the document's navigation bar.