Cybersecurity Playbooks Password Security Playbook
All Staff Playbook Identity & Access

Password Security Playbook

Compromised credentials are the entry point for the majority of serious cyberattacks. This playbook defines what good looks like for password creation, storage, MFA, and governance — for every person in your organisation.

83%
Of breaches involve compromised or weak credentials
99.9%
Of credential attacks blocked by MFA
65%
Of people reuse passwords across multiple accounts
01

Password Creation Standards

A weak password is not better than nothing — it's a false sense of security. These are the minimum standards all staff must follow for any business system.

🔒

Minimum Length: 14 Characters

Length is the most important factor in password strength. 14+ characters exponentially increases the time needed for brute-force attacks. ACSC recommends 14 as the minimum.

🎲

Complexity Requirements

Passwords must include uppercase letters, lowercase letters, numbers, and at least one special character (!, @, #, $, %, etc). No single-word dictionary words.

🚫

No Reused Passwords

Each account must have a unique password. When attackers obtain a password from one breach, they immediately try it on email, banking, and Microsoft 365 — known as credential stuffing.

Common weak patterns to avoid: Names of family members, pets, or places. Birth dates or years. Sequential patterns like Password1!, Company2024!, or Summer2024. These are among the first patterns automated crackers try.
02

Multi-Factor Authentication (MFA)

MFA is the single most impactful control you can implement. Even if an attacker has your password, MFA prevents them from logging in. It is non-negotiable for all business systems.

End Users

Enable MFA on All Business Accounts

Microsoft 365, business banking portals, practice management software, and any system that holds client data must have MFA enabled. No exceptions.

Use an Authenticator App — Not SMS

Microsoft Authenticator or Google Authenticator are preferred. SMS-based codes are vulnerable to SIM-swapping attacks. Use an app wherever possible.

Never Approve Unexpected MFA Requests

If your Authenticator app shows a request you didn't initiate, deny it immediately. Someone has your password and is trying to log in. Report to IT immediately.

Cybersecurity Team / IT Admins

Mandate MFA via Conditional Access

Deploy Conditional Access policies in Entra ID to enforce MFA for all users on all applications. Block legacy authentication protocols that bypass MFA.

Require Phishing-Resistant MFA for Admins

Admin accounts must use FIDO2 hardware keys (YubiKey) or Windows Hello for Business — not push notifications, which are vulnerable to MFA fatigue attacks.

Monitor MFA Registration & Usage

Review MFA registration reports monthly. Any admin account without MFA is a critical finding. Alert on MFA method changes, particularly for privileged accounts.

03

Password Storage & Sharing

✓ Do This
  • Use an approved password manager (see Section 6) for all passwords
  • Store recovery codes for MFA in a secure, offline location
  • Use service account delegation tools instead of sharing credentials
  • Change shared passwords immediately when a team member with access leaves
✗ Never Do This
  • Share your password with anyone — including IT staff or supervisors
  • Store passwords in a browser on an unmanaged personal device
  • Write passwords on sticky notes, notebooks, or unencrypted documents
  • Send passwords via email, SMS, Teams, or Slack — even temporarily
  • Store passwords in a spreadsheet, even a password-protected one
IT staff note: When legitimate IT support needs access to a system, use temporary access grants, PIM elevation, or watched credential access — never ask the user for their password. If a vendor says they need your M365 password, escalate to management.
04

Password Expiry & Reset Policy

Microsoft and NIST have moved away from mandatory periodic password changes — forced rotation often leads to predictable patterns (Password1 → Password2). Instead, the focus is on long, unique passwords with MFA and reset triggered by risk signals.

Scenario
Action Required
Timeline
Suspected or confirmed account compromise
Immediate forced reset across all accounts
Immediately
Employee offboarding
Disable account, revoke sessions, rotate shared credentials
Same day as departure
Password exposed in a data breach (HaveIBeenPwned)
Reset the specific password and all reused passwords
Within 24 hours
Routine rotation (accounts without MFA)
Forced password change required
Every 90 days
Accounts with MFA and strong passwords
No mandatory rotation unless triggered by risk signal
N/A
05

Account Lockout Policy

Failed Login Threshold

Accounts should be locked after 10 failed login attempts. This prevents brute-force attacks while reducing lockout from accidental mistype.

Recommended: 10 attempts

Lockout Duration

Automatic unlock after 15 minutes for standard users. Admin accounts should require manual unlock by IT to prevent persistence by an attacker who triggered the lockout.

Standard: 15 min | Admin: Manual unlock

Observation Window

The failed attempt counter should reset after 15 minutes of no activity, preventing lockouts from slow, distributed password spray attacks.

Recommended: 15 minutes

Alert on Repeated Lockouts

Multiple lockout events on the same account in a short period is a sign of an active attack or password spray. IT should be alerted automatically.

Alert: 3+ lockouts in 1 hour
06

Password Managers — Required for All Staff

A password manager is the only practical way to have unique, strong passwords for every account without writing them down or reusing them. All staff should use an approved password manager.

Bitwarden (Business)

Open-source, independently audited, with enterprise sharing and admin controls. Preferred choice for teams wanting a dedicated password management platform separate from Microsoft.

1Password (Teams/Business)

Well-established platform with strong security architecture. Supports travel mode, secret keys, and team vaults. Good choice for businesses with compliance requirements.

Avoid: Browser password managers on personal unmanaged devices, LastPass (following their 2022 breach), and any password manager that stores your vault on a device without encryption at rest.
07

Director & Business Owner Responsibilities

Password security isn't just an IT matter — it requires visible leadership and policy-level support. Directors and business owners have specific responsibilities.

Formalise the Password Policy

Adopt this playbook or a derivative as official company policy. Employees and contractors should acknowledge it in writing during onboarding.

Lead by Example

Executive accounts are the highest-value targets. Directors should use phishing-resistant MFA (hardware keys), password managers, and separate admin accounts — not just expect this of staff.

Fund Password Manager Deployment

Password managers typically cost $3–$6 per user per month. This is one of the highest-ROI security investments available. Approve the budget.

Include Password Policy in Staff Contracts

Password and credential security obligations should be explicit in employment agreements and contractor terms — creating accountability and enabling enforcement.

08

Training, Awareness & Policy Review

Onboarding

New Staff Induction

All new employees must complete password security training and acknowledge the policy before they're issued business credentials.

Quarterly

Phishing Simulation & Refresh

Run a quarterly phishing simulation. Staff who click should receive targeted training, not punishment. Track click rates as a metric over time.

Annual

Full Policy Review

Review this policy annually against current ACSC guidance, any incidents in the past year, and any changes to your IT environment or staff structure.

Ad-hoc

Post-Incident Briefing

After any credential-related security incident — internal or industry-wide — run a team briefing. Use real examples without blame to reinforce the stakes.

Want to Deploy These Controls?

Melbits can configure MFA, Conditional Access, and password management for your M365 environment. Book a free review and we'll show you where your biggest gaps are.