My view is what it protects you against is the dual use of a password and the other org giving up the hash. So Bob uses the same password at my org as he used at Ashley Madison. They cough of the hash, the bad guys start to reverse it. It becomes a race, will they reverse it before Bob's PW expires in my org. More than 12 characters I would probably win, less than that probably not.
And of course the bad guys have to make the connection that Bob at Ashley is Bob at my org. And that is where I start to feel it just isn't worth it. I guess what gets lost in this debate is what you bring up. How solid are your other controls, as you mention admin rights, applocker, patching, very solid web filtering, EMET and active intrusion detection. I strongly believe that we are in a really good place on the important items. We actually have agents on every box in the org phoning to a 24/7 monitored NOC watching for things in amazing detail. It's all relative to your overall posture I guess. I answered you on your 2FA comment in more detail. Short version passwords are broke, they are not very mitigatable. ________________________________ From: listsadmin@lists.myitforum.com [listsadmin@lists.myitforum.com] on behalf of Kurt Buff [kurt.b...@gmail.com] Sent: Monday, April 25, 2016 8:54 PM To: ntsysadm Subject: Re: [NTSysADM] RE: Password expiring debate on patch management At the very least exfiltration - with long enough passwords, it helps mitigate that. Of course, you should have other measures in place, such as no administrative access for users, whitelisting of software, etc. As I stated on the other list, not requiring passwords to expire isn't an argument against passwords (complex/long or not), it's an argument for 2fa, which might, or might not, be feasible for a given situation. Kurt On Mon, Apr 25, 2016 at 4:27 PM, Kennedy, Jim <kennedy...@elyriaschools.org<mailto:kennedy...@elyriaschools.org>> wrote: "Even six months is far better than never" Why? ________________________________ From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> [listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com>] on behalf of Dave Lum [l...@ochin.org<mailto:l...@ochin.org>] Sent: Monday, April 25, 2016 6:58 PM To: ntsys...@lists.myitforum.com<mailto:ntsys...@lists.myitforum.com> Subject: [NTSysADM] Password expiring debate on patch management Anyone see the debate on the Patch management list, driven by this: https://www.cesg.gov.uk/articles/problems-forcing-regular-password-expiry I don’t even know how it’s a debate other than the desired frequency (no one-size-fits-all on that IMO). Even six months is far better than never. With expiring passwords you at bare minimum mitigate employee’s that leave. David Lum Systems Administrator III P: 503.943.2500<tel:503.943.2500> E: l...@ochin.org<mailto:l...@ochin.org> A: 1881 SW Naito Parkway, Portland, OR 97201 [Facebook Link]<https://www.facebook.com/OCHINinc>[Twitter Link]<https://twitter.com/ochininc>[Linkedin Link]<http://www.linkedin.com/company/ochin> www.ochin.org<https://www.ochin.org/> [OCHIN email] Attention: Information contained in this message and or attachments is intended only for the recipient(s) named above and may contain confidential and or privileged material that is protected under State or Federal law. If you are not the intended recipient, any disclosure, copying, distribution or action taken on it is prohibited. If you believe you have received this email in error, please contact the sender with a copy to complia...@ochin.org<mailto:complia...@ochin.org>, delete this email and destroy all copies.