This document provides answers to frequently asked questions (FAQs) about the Credentials Policy and Password Standard. The answers are provided to help the UW–Madison IT community understand how to implement UW-528 IT Credentials and the Password Standard.
The first version of this FAQ document anticipates questions the UW-Madison IT community may have during the initial implementation of UW-528 and the Password Standard. New questions may arise as implementation continues, and this document may be revised to include those questions. If you would like to suggest a question to be included in a future version, please email ITPolicy@cio.wisc.edu.
UW–Madison has adopted an IT Credentials Policy, UW-528. This policy logically fits into a framework that follows NIST SP 800-63, “Digital Identity Guidelines.” An authentication policy would also fit into this framework and may be developed in the future. However, no timeline for development of an authentication policy has been established.
MFA is more appropriately addressed in an authentication policy than a credentials policy. Specific tools used for MFA (e.g., Duo) do constitute credentials, and separate standards should be developed for these tools. A future authentication policy should address MFA and specify what authenticators are appropriate.
NIST 800-63 recommends against required password changes, as it tends to decrease password quality.1
Common authentication and authorization systems provide the following advantages that increase overall security and improve user experience:
Only when there is a use case that is not covered by the UW–Madison Password Standard. The Password Standard is based on NIST 800-63, which considers both technical and usability factors.
Using a single standard throughout the university:
Because having multiple standards erodes the benefits described above, the use of different (including “more stringent”) requirements is discouraged. However, if a use case is not covered by the UW–Madison Password Standard, a unit may establish a Use-Case-Specific Standard.
Requirements for adopting, developing, and documenting Use-Case-Specific Standards are available in UW-528 IT Credentials.
Even when it should not be required, use of longer, stronger passwords can be encouraged by:
A Use-Case-Specific Standard is needed when there is a technical barrier or a regulatory or contractual requirement that cannot be met by following the Password Standard.
UW-528 IT Credentials requires all Use-Case-Specific Standards to be documented. The documentation must specify a standard that works within the limitations of the use-case and must describe any required compensating controls.
Possible examples of Use-Case-Specific Standards include but are not limited to:
Once established, a Use-Case-Specific Standard should be applied consistently for all similar use cases. For example, if a Use-Case-Specific Standard developed for one piece of equipment can apply to a newly acquired piece of equipment, you should use the existing standard instead of creating a new one. All Use-Case-Specific Standards must be documented, per UW-528 IT Credentials.
More information about reporting compromised credentials and other incidents is available at Reporting an incident to the Office of Cybersecurity.
Specific answers will vary from case to case. In general, though, you can:
Use this opportunity to recommend best practices that go beyond minimum requirements (see password composition best practices question below for more information).
Alternatives will vary by system, but application keys and X509 Certificates are common credential options. Each type of credential option has its own security profile (for example, the APIs on the developer portal use OAuth2 Access Tokens). All options require that credentials be kept secure.
Keep the password secure. Follow the Password Standard and best practices for storing and sharing secrets, including using a key management service or password manager.
Create and document a Use-Case-Specific Standard that will apply to all devices in a similar situation and with a similar risk profile. Include the required compensating controls for these devices in the Use-Case-Specific Standard.
If you need to implement credentials, you should follow your customer’s policy and standard. When possible, you should use federated authentication so that you do not have to implement credentials in your application. Federated authentication also offers other advantages (see password composition best practices question above).
UW-528 IT Credentials
UW-Madison - IT Password Standard
Incident Response Procedure
Incident Reporting and Response Procedures Flowchart
Reporting an incident to the Office of Cybersecurity
NIST SP 800-63, “Digital Identity Guidelines"
Please address questions or comments to itpolicy@cio.wisc.edu.
1See Q-B05 in NIST 800-63: Digital Identity Guidelines Frequently Asked Questions
2See Usability in NIST 800-63-3b
3See Authenticator and Verifier Requirements in NIST 800-63