All Controls
Security Control

Password Policies & Managers

NIST ProtectPR.AC-1CIS Control 5: Account Management

What This Control Means

Password management encompasses the policies, tools, and practices that govern how credentials are created, stored, and rotated across an organization. Strong password hygiene remains a critical layer of defense even when multi-factor authentication is in place, because passwords are still the primary authentication factor for most systems and many legacy applications do not support MFA.

Modern password guidance from NIST SP 800-63B has shifted away from the traditional approach of requiring complex character combinations and frequent rotation. Instead, the emphasis is on password length (at least 14 characters), screening against known-breached password lists, and eliminating predictable patterns. Longer passphrases composed of random words are both easier to remember and harder to crack than short, complex strings.

Enterprise password managers such as 1Password Business, Bitwarden, or Keeper solve the practical problem of credential sprawl. The average employee manages dozens of accounts, and without a password manager, reuse is nearly inevitable. A centralized password manager generates unique, high-entropy credentials for every account, stores them in an encrypted vault, and enables secure sharing among team members without exposing plaintext passwords.

Organizations should enforce password manager adoption through policy and make it easy by providing a company-licensed solution. Combining a password manager with a ban on browser-saved passwords and regular audits of weak or reused credentials creates a robust credential hygiene program that significantly reduces the risk of credential-based attacks.

Why Insurers Care

Cyber insurance applications frequently ask about password policies, including minimum length requirements, complexity rules, and whether the organization uses a password manager. Insurers view poor password hygiene as a leading indicator of breach risk because credential reuse and weak passwords are the root cause of a large percentage of claims.

Demonstrating a mature password management program (enterprise password manager deployment, enforced length minimums, and screening against breached-credential databases) signals to underwriters that the organization takes proactive steps to reduce its attack surface. Some carriers offer premium discounts for organizations with documented, enforced password policies.

Industry-Specific Notes

Healthcare (HIPAA)

HIPAA requires unique user identification and emergency access procedures under the Security Rule. Shared credentials violate the audit trail requirements of 45 CFR 164.312(a)(2)(i). Password managers help healthcare organizations maintain individual accountability while managing access to EHR systems and clinical applications.

Legal (ABA Guidelines)

Client trust accounts and case management systems contain highly sensitive information that demands strong credential protection. The ABA Model Rules of Professional Conduct Rule 1.6 requires reasonable efforts to prevent unauthorized disclosure, and the use of unique, strong passwords for each system is a baseline expectation in ethics guidance.

Financial Services (GLBA/PCI-DSS)

The GLBA Safeguards Rule requires access controls that include authentication mechanisms. FFIEC guidance specifies that financial institutions should implement password policies commensurate with the risk of the systems being protected. PCI-DSS Requirement 8.2 mandates unique IDs and strong authentication for all users accessing cardholder data.

Retail / E-commerce (PCI-DSS)

PCI-DSS Requirement 8.2 requires unique identification and strong authentication for all personnel with access to cardholder data. Default vendor passwords must be changed before systems go into production. Retail organizations managing point-of-sale systems must ensure that service account credentials are unique and securely stored.

Government / Defense (CMMC 2.0)

NIST 800-171 control IA.L2-3.5.7 requires a minimum password complexity, and IA.L2-3.5.8 prohibits password reuse for a specified number of generations. CMMC assessors verify that password policies are documented, enforced technically, and audited regularly. FedRAMP-authorized services must comply with NIST 800-63B password guidelines.

Implementation Steps

Select and deploy an enterprise password manager for all employees

Establish a password policy requiring a minimum of 14 characters and screening against breached-credential lists

Disable browser-based password saving on managed devices via group policy or MDM

Migrate shared credentials (Wi-Fi passwords, service accounts) into the password manager's secure sharing vaults

Conduct quarterly audits using the password manager's reporting tools to identify weak or reused credentials

Want to know how your organization measures up on this control?

Take the free assessment →