Greater Saskatoon Catholic Schools

I.T. Password Procedures

1.0 Overview

Solid password procedures are perhaps the most important security control an organization can employ.Since the responsibility for choosing good passwords falls on the users, a detailed and easy-to-understand policy is essential.


2.0 Purpose

The purpose of this document is to specify guidelines for use of passwords.Most importantly, this policy will help users understand why strong passwords are a necessity, and help them create passwords that are both secure and useable.Lastly, this policy will educate users on the secure use of passwords.


3.0 Scope

This policy applies to any person who is provided an account on the organization's network or systems, including: employees, guests, contractors, partners, vendors, etc.

 

4.0 Procedures

 

4.1 Construction

The best security against a password incident is simple: following a sound password construction strategy.Greater Saskatoon Catholic Schools mandates that users adhere to the following guidelines on password construction:

         Passwords must be at least 8 characters

 

         At least one character must be an upper case letter

 

         Passwords must be comprised of a mix of upper and lower case characters

 

         At least one character must be digit from 0 to 9

 

         Passwords should not be comprised of an obvious keyboard sequence (i.e., qwerty)

 

         Passwords should not include "guessable" data such as personal information about yourself, your spouse, your pet, your children, birthdays, addresses, phone numbers, locations, etc.

 

Creating and remembering strong passwords does not have to be difficult.Substituting numbers for letters is a common way to introduce extra characters - a '3' can be used for an 'E,' a '4' can be used for an 'A,' or a '0' for an 'O.'Symbols can be introduced as well: an 'S' can become a ',' or an 'i' can be changed to a '!.'

Another way to create an easy-to-remember strong password is to think of a sentence, and then use the first letter of each word as a password.The sentence: 'The quick brown fox jumps over the lazy dog!' easily becomes the password 'Tqbfjotld!'.Of course, users may need to add additional characters and symbols required by the Password Policy, but this technique will help make strong passwords easier for users to remember.


4.2 Confidentiality
†††††††††††

Passwords should be considered confidential data and treated with the same discretion as any of the organization's proprietary information.The following guidelines apply to the confidentiality of organization passwords:

         Users must not disclose their passwords to anyone

 

         Users must not share their passwords with others (co-workers, supervisors, family, etc.)

 

         Users must not write down their passwords and leave them unsecured

 

         Users must not check the "save password" box when authenticating to applications

 

         Users must not use the same password for different systems and/or accounts

 

         Users must not send passwords via email

 

         Users can only re-use passwords after four password changes.


4.3 Change Frequency

In order to maintain good security, passwords should be periodically changed.This limits the damage an attacker can do as well as helps to frustrate brute force attempts.Greater Saskatoon Catholic School employees will be required to change their password twice a year.



 

4.4 Incident Reporting

Since compromise of a single password can have a catastrophic impact on network security, it is the userís responsibility to immediately report any suspicious activity involving his or her passwords to the IT Manager. Any request for passwords over the phone or email, whether the request came from organization personnel or not, should be expediently reported. When a password is suspected to have been compromised the IT Manager will request that the user, or users, change all his or her passwords.

 

5.0 Enforcement

This policy will be enforced by Superintendents of Education. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities or theft of GSCS property (physical or intellectual) are suspected, GSCS may report such activities to the applicable authorities.


6.0 Definitions

Authentication-A security method used to verify the identity of a user and authorize access to a system or network.

Password-A sequence of characters that is used to authenticate a user to a file, computer, network, or other device.Also known as a passphrase or passcode.



7.0 Revision History

Revision 1.0, 8/9/2011

Revision 2.0, 8/13/2012