Skip to content

3.5.8 — No Password Recycling

Prohibit password reuse for a specified number of generations.

Enforce a password history of at least 24 passwords. This prevents users from cycling through a small set and returning to their favorite.

Why 24? With no forced rotation, users rarely change passwords — so 24 passwords of history effectively means they can never reuse one. With monthly rotation (if required), 24 means they can’t reuse a password for two years.

Combine this with a minimum password age (typically 1 day) to prevent users from rapidly cycling through 24 changes in one sitting to get back to their preferred password.

The assessor will check the actual configuration — both the history depth and the minimum age.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is a password reuse restriction defined?Policy states 24-password history (or your defined number)
2Is password reuse technically prevented?AD/Entra configured to remember 24 passwords and reject reuse

Documents they’ll review: Identification and authentication policy; procedures addressing authenticator management; system security plan; system configuration settings showing password history

People they’ll talk to: Personnel with information security responsibilities; system or network administrators

Live demos they’ll ask for: Mechanisms enforcing password history requirements


These are the actual questions. Have answers ready.

  • “How many previous passwords does your system remember?”
  • “Show me the GPO or Entra configuration for password history.”
  • “Is there a minimum password age to prevent rapid cycling?”
  • “What happens when a user tries to reuse a recent password?”

History too short. Remembering only 5 passwords means a user cycles through 5 and gets back to their favorite. Set to 24.

No minimum password age. A user rapidly changes their password 24 times in 5 minutes to exhaust the history and reuse their preferred password. Minimum 1-day age prevents this.

Configuration doesn’t match policy. Policy says 24 but GPO is set to 12. Check the actual configuration.



RequirementWhy it matters here
3.5.7 — Password RulesComplexity rules ensure new passwords are strong; history ensures they’re different
3.5.9 — Change Temp PasswordsTemp passwords get changed on first use, then history tracking begins

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: IA.L2-3.5.8 | SPRS Weight: 1 point | POA&M Eligible: Yes