Password Policy Template

202 KB | 3 files | null DOC,null PDF

Passwords are common, easy to create and have been the standard for user authentication for a very long time. That means they are susceptible to attack. These policies will help your users create passwords that pass security muster.

Passwords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible, they must be carefully created and used. Without strict usage guidelines, the potential exists that passwords will be created that are easy to break, allowing easier illicit access to information systems, thereby compromising the security of those systems.

This Password Policy Template includes the following sections:

  • Default policy statements that define what the enterprise must do
  • Default procedures that define how the enterprise must do it
  • Baseline recommendations to customize the template to individual enterprise requirements

Use this template to help build an efficient and effective enterprise security policy.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Password Policy Template.doc
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.

All IT Downloads from Info-Tech Research Group» | Visit Info-Tech Research Group »
Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ...  More >>

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ...  More >>

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.