Homexnetd.com

3.5 IDENTIFICATION AND AUTHENTICATION

3.5.10 Store and transmit only cryptographically-protected passwords | NIST 800-171 control 3.5.10 mandates storing passwords in a scrambled format using one-way hashing. This protects passwords even if a breach occurs, as the hash can't be easily reversed to reveal the original password. This enforces accountability by requiring strong password storage and improves security by making stolen data less valuable.

3.5 IDENTIFICATION AND AUTHENTICATION
Back to "3.5 IDENTIFICATION AND AUTHENTICATION"
3.5 IDENTIFICATION AND AUTHENTICATION
🖨️

3.5.10 Store and transmit only cryptographically-protected passwords

By wnoble2005@gmail.com (William Noble) 📅 2024-03-01
NIST 800-171 control 3.5.10 mandates storing passwords in a scrambled format using one-way hashing. This protects passwords even if a breach occurs, as the hash can't be easily reversed to reveal the original password. This enforces accountability by requiring strong password storage and improves security by making stolen data less valuable.



Cryptographically-protected passwords use salted one-way cryptographic hashes of passwords.

Benefits:

Reduced Breach Impact: Even if attackers steal password data, they can't easily crack the cryptographically protected versions (hashed passwords with salts). This minimizes unauthorized access.

Stronger Authentication: Cryptographic protection makes brute-force attacks, where attackers try millions of passwords, much harder. This strengthens your overall authentication system.

Accountability:

Senior Management: Sets the security tone by prioritizing password security, allocating resources for secure password storage and transmission solutions, and enforcing compliance with control 3.5.10. They are accountable for ensuring IT security policies and procedures are in place.

IT Security Team: Implements technical solutions for secure password storage (using hashing algorithms with salts) and transmission (using encryption protocols like TLS/SSL). They are responsible for educating users, monitoring password practices, and identifying and addressing any vulnerabilities.



System Owners: Own and manage specific systems where passwords are used. They are accountable for ensuring their systems adhere to control 3.5.10. This may involve working with the IT security team to implement secure password storage mechanisms and access controls.

Individual Users: Choose strong passwords and follow password hygiene best practices (avoiding reuse, using complex combinations). They are responsible for not sharing passwords or falling for phishing attempts.

Implementation:

Hashing: Passwords are converted into a unique string of characters (hash) using a one-way mathematical function. This hash cannot be reversed to reveal the original password.

Salting: A random value (salt) is added to the password before hashing. This prevents attackers from pre-computing common password hashes for future attacks (rainbow tables).

Go to docs.google.com


About "3.5.10 Store and transmit...words" 🡃
Category:Cybersecurity Maturity Model
Family:Identification and Authentication (AC 3.5)
Type:Derived Security Requirements
#CybersecurityMaturityModel #DerivedSecurityRequirements

More on q4q.com

Q4Q Technical Solutions

© q4q.com 1999-2024