Proper generation of temporary passwords
Summary
Temporary passwords should be automatically and randomly generated.
Description
The requirement emphasizes that temporary passwords should be generated automatically by the system, without user intervention. Randomly generated passwords are more secure than manually chosen or predictable passwords. They are less susceptible to brute-force attacks, where an attacker systematically tries different combinations to guess the password.
References
- CWE-263. Password aging with long expiration
- CWE-640. Weak password recovery mechanism for forgotten password
- NIST80063-6_1_1. Binding at enrollment
- MITRE-M1027. Password policies
- CMMC-IA_L2-3_5_9. Temporary passwords
- HITRUST-01_d. User password management
- OWASPSCP-3. Authentication and password management
- ASVS-2_3_1. Authenticator lifecycle
- SIG-H_3_1_9. Access control
- CASA-2_3_1. Authenticator Lifecycle
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.
Supported In
This requirement is verified in following services
Essential Plan
Advanced Plan