NIST proposes barring some of the most nonsensical password rules
NIST proposes barring some of the most nonsensical password rules

arstechnica.com
NIST proposes barring some of the most nonsensical password rules

NIST proposes barring some of the most nonsensical password rules
NIST proposes barring some of the most nonsensical password rules
The latest NIST guidelines now state that:
Makes sense. Most compromises aren't brute force attacks. Allow all the characters and any brute force that is attempted will have to assume they're part of it.
Removing required periodical changes means people are less likely to use the same password and just increment a number added to the end. A compromised password with a setup like that is still compromised, they can make an educated guess as to what the new number is based on when was compromised compared to now.
Please don’t take those recommendations out of context.
They also recommend MFA, but people only ever bring up the “no rotation” bit.
Are they at least recommending non-SMS MFA now?
Emphasis was from the article, not mine.
They also recommend not using knowledge based prompts, allowing at least 64: characters,