Difference between revisions of "Allowing password aging"

From OWASP
Jump to: navigation, search
(Undo revision 51835 by Dap263 (Talk))
Line 2: Line 2:
 
{{Template:SecureSoftware}}
 
{{Template:SecureSoftware}}
  
__TOC__
 
  
 
[[ASDR Table of Contents]]
 
[[ASDR Table of Contents]]

Revision as of 21:03, 17 February 2009

This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.ASDR Table of Contents

Last revision (mm/dd/yy): 02/17/2009


Description

Allowing password aging to occur unchecked can result in the possibility of diminished password integrity.

Consequences

  • Authentication: As passwords age, the probability that they are compromised grows.

Exposure period

  • Design: Support for password aging mechanisms must be added in the design phase of development.

Platform

  • Languages: All
  • Operating platforms: All

Required resources

Any

Severity

Medium

Likelihood of exploit

Very Low

Just as neglecting to include functionality for the management of password aging is dangerous, so is allowing password aging to continue unchecked. Passwords must be given a maximum life span, after which a user is required to update with a new and different password.

Risk Factors

TBD

Examples

  • A common example is not having a system to terminate old employee accounts.
  • Not having a system for enforcing the changing of passwords every certain period.

Related Attacks

TBD

Related Vulnerabilities

Related Controls

  • Control 1
  • Control 2
  • Design: Ensure that password aging is limited so that there is a defined maximum age for passwords and so that the user is notified several times leading up to the password expiration.

Related Technical Impacts

References

TBD