While it would be nice, it's also expensive.

Good 2fa imposes a cost, and losing a smart card invokes a *lot* more
pain than forgetting a password.

Kurt

On Wed, Apr 27, 2016 at 5:31 PM, Jack Kramer <j...@smalltype.net> wrote:
> Honestly, any standard requiring frequent change (pretty much anything more
> often than 6mo to a year) is going to produce post-it behaviors. You know,
> where the password is on a post-it under the keyboard.
>
> I would rather see more places implement 2-factor authentication--preferably
> with smart cards so you can also guarantee a machine will lock up when the
> user leaves it (assuming they take their card at least--but that's
> encouraged by also tying the cards to access control so you need it for
> doors and the like).
>
> Sent from my iPhone
>
> On Apr 27, 2016, at 8:15 PM, Sean Martin <seanmarti...@gmail.com> wrote:
>
> Great timing for this thread.
>
> A recently updated password policy has sparked some debate at %dayjob%. It
> contains some of the expected requirements:
>
> - unique per account
> - varying length requirements based on account type (domain user,
> administrative user, etc.)
> - don't include userID or personal information (birthday, phone number, SS#,
> etc.)
> - standard complexity requirements (uppercase/lowercase/numerical/special)
>
> ...then some additional requirements, which are raising some eyebrows:
>
> - must not contain a dictionary word
> - must not contain repetitive or sequential characters
> - must not be derived from publicly searchable internet or social media
> information (favorite sports team, names of friends or family, schools,
> restaurants, etc.)
>
> While I understand the intent, my opinion is that no typical end-user is
> going to truly understand what these requirements mean, or will simply find
> them too difficult to comply with. Our current expiration policy is 90 days.
> I believe the end users would rather deal with more frequent password
> changes than have to adhere to the above stated policy.
>
> Interested in other opinions....
>
> - Sean
>
> On Wed, Apr 27, 2016 at 3:33 PM, Micheal Espinola Jr
> <michealespin...@gmail.com> wrote:
>>
>> Thanks.  100% true story + federal investigation.  State lines were
>> crossed, and millions of dollars were at stake.
>>
>> --
>> Espi
>>
>>
>> On Wed, Apr 27, 2016 at 2:39 PM, Dave Lum <l...@ochin.org> wrote:
>>>
>>> That’s a perfect example Michael.
>>>
>>>
>>>
>>> Or, let’s say I am in IT at Target, maybe later I move into IT at an HVAC
>>> company that has VPN access to Target (IT guys working at companies that do
>>> business with their former employers? Never happens right?). Maybe my PC at
>>> the HVAC place get compromised and since Target never disabled my account
>>> and I use the same password at %newjob% as I did %oldjob%, a simple hop over
>>> VPN now leverages the access I had at Target…
>>>
>>>
>>>
>>> Except what actually happened with Target was more *harder* than what I
>>> described above.
>>>
>>>
>>>
>>> IMO any place that doesn’t require a password expiration of any kind is
>>> likely (exceptions to this, sure) the same place that doesn’t have a process
>>> for disabling all the access former employees have.
>>>
>>>
>>>
>>> Dave
>>>
>>>
>>>
>>> From: listsadmin@lists.myitforum.com
>>> [mailto:listsadmin@lists.myitforum.com] On Behalf Of Micheal Espinola Jr
>>> Sent: Tuesday, April 26, 2016 6:31 PM
>>> To: ntsys...@lists.myitforum.com
>>> Subject: Re: [NTSysADM] RE: Password expiring debate on patch management
>>>
>>>
>>>
>>> Old admin knows many management passwords
>>> Old admin goes to work for competitor
>>> Company and competitor are up for same contracts
>>> Old admin remotes into company to look at emails and presentation
>>> materials
>>> Competitor starts taking business from company by usurping sales pitches
>>> in very specific ways
>>> I get hired 2+ years after old admin in question
>>> I review remote logs to establish behavioral patterns
>>> I see odd logon behavior and trace repetitive IPs
>>> I trace IPs to competitor as well as old admin specifically
>>>
>>>
>>>
>>> I am Jacks complete lack of surprise when management doesnt change their
>>> password and uses the same passwords for many things.
>>>
>>>
>>>
>>>
>>>
>>>
>>> --
>>> Espi
>>>
>>>
>>>
>>>
>>>
>>> On Mon, Apr 25, 2016 at 4:27 PM, Kennedy, Jim
>>> <kennedy...@elyriaschools.org> wrote:
>>>
>>>
>>>
>>> "Even six months is far better than never"
>>>
>>>
>>>
>>> Why?
>>>
>>>
>>>
>>> ________________________________
>>>
>>> From: listsadmin@lists.myitforum.com [listsadmin@lists.myitforum.com] on
>>> behalf of Dave Lum [l...@ochin.org]
>>> Sent: Monday, April 25, 2016 6:58 PM
>>> To: ntsys...@lists.myitforum.com
>>> Subject: [NTSysADM] Password expiring debate on patch management
>>>
>>> Anyone see the debate on the Patch management list, driven by this:
>>> https://www.cesg.gov.uk/articles/problems-forcing-regular-password-expiry
>>>
>>>
>>>
>>> I don’t even know how it’s a debate other than the desired frequency (no
>>> one-size-fits-all on that IMO). Even six months is far better than never.
>>> With expiring passwords you at bare minimum mitigate employee’s that leave.
>>>
>>>
>>>
>>> David Lum
>>>
>>> Systems Administrator III
>>> P: 503.943.2500
>>> E: l...@ochin.org
>>> A: 1881 SW Naito Parkway, Portland, OR 97201
>>>
>>>
>>> <image001.png><image002.png><image003.png> www.ochin.org
>>> <image004.jpg>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> Attention: Information contained in this message and or attachments is
>>> intended only for the recipient(s) named above and may contain confidential
>>> and or privileged material that is protected under State or Federal law. If
>>> you are not the intended recipient, any disclosure, copying, distribution or
>>> action taken on it is prohibited. If you believe you have received this
>>> email in error, please contact the sender with a copy to
>>> complia...@ochin.org, delete this email and destroy all copies.
>>>
>>>
>>>
>>> Attention: Information contained in this message and or attachments is
>>> intended only for the recipient(s) named above and may contain confidential
>>> and or privileged material that is protected under State or Federal law. If
>>> you are not the intended recipient, any disclosure, copying, distribution or
>>> action taken on it is prohibited. If you believe you have received this
>>> email in error, please contact the sender with a copy to
>>> complia...@ochin.org, delete this email and destroy all copies.
>>
>>
>


Reply via email to