All
All

Enterprise Password Management Guide

285 KB | 3 files |  DOC, PDF

Despite technical advances, the simple password remains a key factor in protecting most organizations' vital data and network. These guidelines will help you set policies for strong passwords and manage risk from careless users.

Passwords are used in many ways to protect data, systems, and networks. For example, passwords are used to authenticate users of operating systems and applications such as e-mail, labor recording, and remote access. Passwords are also used to protect files and other stored information, such as password-protecting a single compressed file, a cryptographic key, or an encrypted hard drive. In addition, passwords are often used in less visible ways; for example, a biometric device may generate a password based on a fingerprint scan, and that password is then used for authentication.

This publication provides recommendations for password management, which is the process of defining, implementing, and maintaining password policies throughout an enterprise. Effective password management reduces the risk of compromise of password-based authentication systems.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Enterprise Password Management Guide.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ...  More >>

IT_Man68 Stakeholder Engagement: The Game Changer for Program Management

The excerpt from chapter 5 focuses on leveraging stakeholders to prepare your organization for change. This is an essential practice that ensures a successful product delivery. ...  More >>

DataM46 A Rational Foundation for Software Metrology

This report lays the foundation for a rational approach to software metrology, with the scope of the current effort being software as the object of measurement. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.