Proper generation of temporary passwords
Summary
Temporary passwords should be automatically and randomly generated.
Description
The requirement emphasizes that temporary passwords should be generated automatically by the system, without user intervention. Randomly generated passwords are more secure than manually chosen or predictable passwords. They are less susceptible to brute-force attacks, where an attacker systematically tries different combinations to guess the password.
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |
References
- CWE™-263. Password aging with long expiration
- CWE™-640. Weak password recovery mechanism for forgotten password
- NIST 800-63B-6_1_1. Binding at enrollment
- MITRE ATT&CK®-M1027. Password policies
- CMMC-IA_L2-3_5_9. Temporary passwords
- HITRUST CSF-01_d. User password management
- OWASP SCP-3. Authentication and password management
- OWASP ASVS-2_3_1. Authenticator lifecycle
- SIG Core-H_3_1_9. Access control
- CASA-2_3_1. Authenticator Lifecycle
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.