Change temporary passwords of third parties
Summary​
The system must force the change of temporary passwords, which are generated by a third party, after their first use.
Description​
Temporary passwords are often harder to remember and shared over systems whose future integrity may not be guaranteed by the system that created them. Furthermore, there is no control over who has access to the secret besides the third party. Therefore, the passwords should be changed after their first use.
Supported In​
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |
References​
- NIST 800-63B-6_1_1. Binding at enrollment
- MITRE ATT&CK®-M1027. Password policies
- CMMC-IA_L2-3_5_9. Temporary passwords
- HITRUST CSF-01_d. User password management
- HITRUST CSF-05_k. Addressing security in third party agreements
- HITRUST CSF-09_g. Managing changes to third party services
- FedRAMP-IA-5_3. Authenticator management - In-person or trusted third-party registration
- FedRAMP-PS-7. Third-party personnel security
- NIST 800-171-5_9. Allow temporary password use for system logons with an immediate change to a permanent password
- SIG Core-H_3_1_8. Access control
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.