Skip to content

3.5.7 — Password Rules

Enforce a minimum password complexity and change of characters when new passwords are created.

Three things the assessor checks:

Minimum length. 14+ characters is current best practice per NIST SP 800-63B. Eight characters is too short — modern GPUs crack 8-character passwords in hours.

Complexity. Mix of character types (upper, lower, numbers, special) or long passphrases. Azure AD Password Protection can block common passwords and patterns.

Change of characters. When a user creates a new password, it must differ meaningfully from the old one. Not just incrementing a number (Password1 → Password2) or changing one character. This is hard to enforce technically — but blocking common passwords and enforcing length helps.

A note on forced rotation: NIST SP 800-63B no longer recommends forcing periodic password changes unless there’s evidence of compromise. The reasoning: forced rotation leads to weaker passwords (users pick predictable patterns). However, check your specific contract requirements — some may still mandate rotation.

The assessor will check your password policy configuration settings, not just the policy document.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is minimum password complexity defined and enforced?GPO/Entra shows minimum length (14+) and complexity enabled
2Is change of characters enforced when new passwords are created?New passwords must differ meaningfully — blocked common patterns, password history enforced

Documents they’ll review: Identification and authentication policy; procedures addressing authenticator management; system security plan; system configuration settings showing password policy

People they’ll talk to: Personnel with information security responsibilities; system or network administrators

Live demos they’ll ask for: Mechanisms enforcing password complexity and change requirements


These are the actual questions. Have answers ready.

  • “What is your minimum password length? Show me the configuration.”
  • “What complexity requirements do you enforce?”
  • “How do you prevent users from making trivial changes to passwords?”
  • “Do you block common passwords? Show me the configuration.”
  • “Do you force periodic password rotation? What’s the interval? Why?”

8-character minimum. Still the default in many AD deployments. Change it to 14+. The assessor will check the actual GPO setting.

No banned password list. Users choose ‘CompanyName2024!’ which meets complexity but is trivially guessable. Azure AD Password Protection blocks these.

Policy says 14 but system enforces 8. The written policy and the technical configuration don’t match. The assessor checks the system, not the document.

Forced rotation creating weak patterns. Monthly rotation leads to ‘January2024!’, ‘February2024!’. Consider removing forced rotation per NIST 800-63B guidance if your contract allows.



RequirementWhy it matters here
3.5.8 — No Password RecyclingPassword history prevents cycling back to old passwords
3.5.10 — Never Plain TextThese passwords must be hashed/encrypted, never stored in plain text
3.5.3 — MFA EverywhereMFA compensates for password weaknesses — defense in depth

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: IA.L2-3.5.7 | SPRS Weight: 1 point | POA&M Eligible: Yes