GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Security

How To Create a Password Policy To Secure Your Small Business

Jun 13, 2023

A strong password policy ensures security from password-related insider threats as well as makes it difficult for cybercriminals to gain access to your confidential data.

Verified reviewer profile picture
Bhavya AggarwalContent Writer
How To Create a Password Policy To Secure Your Small Business

What we'll cover

One in three (35%) IT managers from our 2022 Zero Trust Survey* say poor passwords and weak logins are the top reasons for cyberattacks on their business. 

A strategically-devised password policy, as recommended by the National Institute of Standards and Technology (NIST) [1], provides a strong line of defense against password-related data breaches—irrespective of whether you’re creating a password policy for the first time or looking to strengthen your existing one.

Ahead, we share best practices from Gartner [2] to help small-business owners create a password policy that’s both NIST-compliant and easy to follow for their teams. We’ve also included expert advice from Anthony Green [3], CTO of FoxTech Cyber, a UK-based cybersecurity company that regularly handles password breaches for small businesses.

“Having designed and developed security systems of national importance, including secure networks, intrusion detection systems, and robust password protocols, my prime focus has always been on making cybersecurity more accessible and effective for SMEs.”

Anthony Green, CTO at FoxTech

GA_06132023_PasswordPolicyBestPractices-AnthonyGreen

Anthony Green

What is a password policy?

A password policy is a company’s playbook for creating, using, and managing secure passwords across business applications and systems. It’s designed to protect the company’s data, systems, and devices from unauthorized access and cyberthreats. This policy encompasses various elements such as minimum password length, character mix, password expiration and reuse rules, and guidelines for password storage and recovery.

Compliance with regulations such as the Payment Card Industry Data Security Standard (PCI DSS) and General Data Protection Regulation (GDPR) is essential, making these elements vital to a sound policy. However, crafting a password policy is just the beginning. Businesses also need to document it, make it accessible to all employees, and weave it into relevant procedures, such as the acceptable use policy and security awareness training.

GA_06132023_PasswordPolicyBestPractices-creatingpasswordpolicy3phases

Phase #1. Draft the content of your password policy

The first phase of creating an effective password policy revolves around drafting content that’s clear, precise, and understandable to everyone at your small business. Here’s how to navigate this phase:

Get stakeholder agreement

Creating an effective password policy requires agreement from key stakeholders, such as your HR team, IT team, and co-founders. Here are a few rules they should mutually agree on:

  • Regulatory compliance: Ask all stakeholders to list out, in a central planning document, privacy laws and regulations relevant to your industry, such as the GDPR for securing users’ personal data. This collaborative approach not only ensures everyone is informed but also contributes to the compliance process. It's also important that stakeholders revisit this document regularly to accommodate new regulations introduced since the policy’s inception or last update.

  • User experience (UX): It’s vital to get stakeholder consensus on making the policy user-friendly. They should agree on practices that allow employees to create, remember, and manage their passwords easily. An agreed example could be allowing the use of a memorable passphrase instead of a complex password that's hard to recall.

  • Feasibility and enforceability: Stakeholders should find common ground in making the policy realistic, affordable, and enforceable. This might involve a joint decision on allocating a budget for software upgrades or replacing an existing software tool to meet policy goals. If working with existing resources, collectively engage with vendors to discover new functions or capabilities that can enhance your policy. For instance, a unanimous agreement on recommending biometric authentication is valuable but only if your existing systems can support it.

Prepare the policy document

The policy document should clearly lay out rules and responsibilities. Here’s what to keep in mind:

  • Employee-specific password guidelines: Introduce dedicated sections in your policy that cater to different employee categories. Consider one primary policy that applies to everyone, supplemented by additional rules for employees from various departments handling sensitive data. This tiered approach makes your policy both comprehensive and specific. For instance, you might set more stringent password requirements for employees that access sensitive client data.

  • Clarity and simplicity in language: When crafting the policy, keep the language clear and avoid complex jargon or legalese that might confuse employees. For example, instead of saying “Avoid sequential alphanumerics,” you could simply advise, “Don't use ‘1234’ or ‘abcd’ in your password.” Keep in mind that while your policy needs to be robust, it isn't a legal document, so prioritize clarity and comprehensibility for your employees.

Define responsibilities

While outlining user roles in your policy, make sure not to assign duties incorrectly. Every user’s responsibilities should be specific to their role and should not overlap with tasks meant for others. For instance, the IT team might be responsible for maintaining the password management system, while employees are responsible for setting and managing their passwords.

Enforce mandatory requirements

When stating mandatory requirements, make them enforceable with clear consequences for noncompliance. For example, if a password must not include the user’s name, clearly state the consequence of breaking this rule, such as a password reset.

Remember, some password requirements can be mandatory in one system but optional in another. For instance, a strong password could be essential to access your company's financial database or customer records. However, it might only be a recommendation for less-sensitive systems such as internal communication tools or access to your company’s news bulletin.

Avoid ambiguity

When including “if possible” statements in your policy, always provide clear guidance on what actions should be taken if the initial task isn’t feasible. For instance, if it’s not possible to update your security questions twice a year, ensure they’re reviewed and updated at least once a year. Also, don't forget to:

  • Document approved exceptions and variations: For instance, you might allow temporary password resets to be performed by team leaders for urgent tasks when IT is not immediately available.

  • Define escalation paths: Clearly explain what to do if someone needs an exception. For instance, if an employee forgets their password, they should know who to contact for a temporary password reset or the recovery process.

Anthony Green [3] sheds some light on the human aspect of password security:

"Understanding people—how they operate and what motivates them—is vital to making security intuitive. The IT team’s role isn't just to say “no.” It's about creating a culture where good password management and security practices become second nature."

Anthony Green, CTO at FoxTech

Phase #2. Set the rules of your password policy

This phase focuses on password confidentiality, blocklisting vs. complexity rules, password length, password aging, password history, and login attempts. Here’s how to approach each rule:

Prioritize password confidentiality

Maintain password confidentiality as a strict requirement. However, remember that an absolute prohibition on sharing passwords may not be practical. For instance, a team might need to share a password for a shared tool, but ensure such cases are exceptional and controlled.

Emphasize blocklisting over complexity rules

Block listing, which prohibits the use of banned passwords, is more effective than password complexity rules, which demand certain combinations of letters, digits, and symbols. If regulations require complexity rules, supplement them with blocklisting. For example, block common passwords such as “password123” or “admin.”

GA_06132023_PasswordPolicyBestPractices-microsoftblocklisting

A representation of how blocklisting works in Microsoft [4]

Set a minimum password length

A minimum of eight characters is typical, aligning with NIST’s guidance [1]. Encourage employees to use longer passwords for stronger security, but be aware that password complexity rules could hamper user experience. 

If you’re not enforcing complexity, you could recommend simple passwords composed of dictionary words. To aid password creation, suggest mnemonics such as initials from a favorite song or a series of words related to a personal interest. For instance, “apple” could be expanded to “amazon-pecos-pecos-loire-elbe”, referencing rivers.

Use password strength meters or similar tools to provide feedback when users are setting their passwords. Also, don’t hide your password creation guidelines—make them visible where users are setting or changing their passwords.

GA_Password Generator_Screenshot_PasswordStrengthMeter_062023

Real-time feedback from a password strength meter (Source)

Prompt password changes after suspected compromise

Recommend employees to change passwords after using a public device or if they suspect a password compromise. You can also set up notifications prompting password changes if a potential user account compromise is detected.

GA_06132023_PasswordPolicyBestPractices-securitynotification

An example of a security notification after logging in to a public device [5]

Maintain password history

To discourage cycling back to familiar passwords, maintain a password history—typically of four to six previous passwords. Monitor frequent password changes, and investigate any suspicious behavior. Allow users the freedom to change their passwords multiple times a day, giving them control if they believe their password has been compromised.

Set login attempt limits and account recovery

Allow at least 10, but not more than 10, consecutive failed password attempts before imposing restrictions. This allows for mistakes while maintaining security. If failed attempts exceed the threshold, lock the account temporarily and offer account recovery options, such as a reset link to the registered email or verification through secondary contact details, rather than forcing a service desk intervention. This helps improve user experience and ensures uninterrupted access for them.

Anthony Green [3] shares his frustration with password rules:

“Outdated password practices such as mandatory 90-day change and using an arbitrary mix of characters are my pet peeves. They lead people to choose and reuse weak passwords—a security nightmare. Besides, this guidance was relevant 30 years ago. We've found the U.K. National Cyber Security Centre's guidance incredibly useful in shaping a modern, secure policy. Their “three random words” approach simplifies password creation while resisting brute force attacks, especially when paired with sound lockout policies for crucial assets.”

Anthony Green, CTO at FoxTech

Phase #3. Explore add-ons beyond passwords

In this phase, we’ll look into multi-factor authentication (MFA), setting rules for privileged users, and using privileged access management tools. 

Implement multi-factor authentication (MFA)

Passwords alone aren’t sufficient for security, particularly in high-risk situations. MFA, which also includes two-factor authentication, adds an additional layer of security by requiring users to provide at least two verification factors to gain access. This could be something they know (password), something they have (a mobile device), or something they are (biometrics).

GA_02212023_TypesofAuthenticationToSecureYourSmallBusiness-mfaand2fa_jpg

Keep in mind

Do not, however, ease your password rules just because MFA is in place. Also, consider making passwordless MFA your strategic goal. This could mean using biometrics and authentication devices, which reduces the risk of password-related breaches.

Use privilege access management tools

For software and system-related password management, a privilege access management tool is highly recommended. These tools help centrally manage privileged accounts (e.g., systems admin, network admin, team managers), minimizing the risk of those credentials being stolen or misused. 

They also automatically update passwords, providing a simple way to keep them up to date and secure. They track password usage and provide detailed reports for compliance purposes. It's like having a vigilant security guard overseeing password use and ensuring the best password practices are maintained.

GA_Microsoft 365_Screenshot_Privilegedaccess_062023

Privileged access security feature in Microsoft 365 (Source)

Keep in mind

Contrary to what you might think, you don't need stricter rules for privileged users. Instead, the use of MFA is good practice, often in combination with privileged access management tools. This approach provides an added layer of protection without overly complicating access for these key users.

Ensuring compliance can be tough, but it doesn’t have to be

While creating an effective password policy is crucial, it’s just the first step. Ensuring employees comply with these rules often poses a more significant challenge. You’re not alone if you're facing resistance from your staff. After all, remembering multiple complex passwords can be difficult.

Anthony Green says “simplicity is key” when it comes to encouraging adherence to password policies. To ease the burden on employees, his organization leverages single sign-on and uses an approved corporate password manager to store randomly generated passwords. “Our employees only have to remember one or two passwords, making secure behavior a breeze rather than a hurdle.”

GA_LastPass_Screenshot_Autofill_062023

LastPass software’s password autofill feature (Source)

Therefore, always consider the human aspect when implementing your password policy. Ease of use often leads to increased security, and the key to achieving this balance lies in understanding and addressing the challenges your employees face. 

By doing so, you not only strengthen your cybersecurity infrastructure but also create an environment where security becomes second nature.

Survey methodologies

*GetApp’s 2022 Zero Trust Survey was conducted in June 2022 among 235 U.S. respondents to learn more about zero trust adoption trends. All respondents identified as either IT professionals, executives, or owners at their company.

GetApp conducted the Biometrics/Passwordless survey in January 2022 among 974 consumers, including 389 business leaders who reported management responsibilities or above to learn about attitudes toward biometrics and the use of multi-factor authentication by U.S. businesses.

Sources

  1. Digital Identity Guidelines, NIST

  2. What Does a Good Password Policy Look Like, Gartner

  3. Anthony Green, LinkedIn

  4. Eliminate Bad Passwords, Microsoft

  5. Security notification example image, AndroidCentral

avatar
About the author

Bhavya Aggarwal

Content Writer
Bhavya Aggarwal is a Technical Content Writer at GetApp, covering IT, Cybersecurity, and Emerging Tech, focusing on IT improvements for SMBs. With over five years of experience, his work has been featured in Gartner, Sprinklr, and YourStory. He holds a bachelor's in commerce with a background in mass communication and digital marketing and is passionate about AI and new technologies. Bhavya lives in Delhi with his family.
Visit author's page